Cyberwar In Israel & Gaza

A wave of hacking attacks on Israeli targets has added a cyber dimension to the conflict with Hamas. The conflict between Israel and its Arab neighbours routinely attracts both intense global interest and politically minded hackers, dubbed hacktivists, who piggyback on the fighting, either to support their side and generate attention.

The most significant measures by the Palestinians may have been the preparation earlier this year, when a  group that Microsoft has names Storm-1133 attacked energy, defence and telecoms companies inside Israel.

More than 100 websites in Israel have been either defaced or temporarily disrupted through simple distributed denial of service attacks (DDoS), which work by flooding a site with a rush of inauthentic traffic, according to security analysts. Hacktivist groups say they are hitting Israeli targets online amid the war in Israel and Gaza, disrupting and defacing websites like the Jerusalem Post."The attackers have managed to knock us offline for extended periods over the past few days," Jerusalem Post editor Avi Mayer told reporters. "This is a blatant assault on freedom of the press."

Hacking groups, including some linked to Russia, are attacking Israeli government and media websites, siding  with Hamas, launched a series of deadly strikes on Israel last week. Many of these groups have previously been focused on the Russian invasion of Ukraine and are  switchingcjing their focus to the Israel-Hamas conflict

One such groups is Killnet, that comprises Russian volunteer hackers, that announced that it would target all Israeli government systems with DDoS traffic and forces to drive them offline. Killnet has blamed Israel for bloodshed in Gaza 

Cyber security firm Group-IB said hackers had compromised a mobile phone application that is used to issue missile alerts to Israeli users during periods of conflict. The hackers exploited a vulnerability in the app to insert fake notifications and inflammatory messages. 

Group-IB said the app since appeared to have been removed from Google’s Play Store, where it had been downloaded 1 million times. 

Group-IB;   Security Affairs:   Reuters:     Bloomberg:   Cybernews:   Guardian:    Washington Post:     

WSJ:    Time:       Image: Nigel Stripe

You Might Also Read: 

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Revealed: CIA Using TwitterX To Recruit Spies
ZTNA Is The Foundation Of Great VDI Deployments »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.