Cyberwar In Israel & Gaza

A wave of hacking attacks on Israeli targets has added a cyber dimension to the conflict with Hamas. The conflict between Israel and its Arab neighbours routinely attracts both intense global interest and politically minded hackers, dubbed hacktivists, who piggyback on the fighting, either to support their side and generate attention.

The most significant measures by the Palestinians may have been the preparation earlier this year, when a  group that Microsoft has names Storm-1133 attacked energy, defence and telecoms companies inside Israel.

More than 100 websites in Israel have been either defaced or temporarily disrupted through simple distributed denial of service attacks (DDoS), which work by flooding a site with a rush of inauthentic traffic, according to security analysts. Hacktivist groups say they are hitting Israeli targets online amid the war in Israel and Gaza, disrupting and defacing websites like the Jerusalem Post."The attackers have managed to knock us offline for extended periods over the past few days," Jerusalem Post editor Avi Mayer told reporters. "This is a blatant assault on freedom of the press."

Hacking groups, including some linked to Russia, are attacking Israeli government and media websites, siding  with Hamas, launched a series of deadly strikes on Israel last week. Many of these groups have previously been focused on the Russian invasion of Ukraine and are  switchingcjing their focus to the Israel-Hamas conflict

One such groups is Killnet, that comprises Russian volunteer hackers, that announced that it would target all Israeli government systems with DDoS traffic and forces to drive them offline. Killnet has blamed Israel for bloodshed in Gaza 

Cyber security firm Group-IB said hackers had compromised a mobile phone application that is used to issue missile alerts to Israeli users during periods of conflict. The hackers exploited a vulnerability in the app to insert fake notifications and inflammatory messages. 

Group-IB said the app since appeared to have been removed from Google’s Play Store, where it had been downloaded 1 million times. 

Group-IB;   Security Affairs:   Reuters:     Bloomberg:   Cybernews:   Guardian:    Washington Post:     

WSJ:    Time:       Image: Nigel Stripe

You Might Also Read: 

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Revealed: CIA Using TwitterX To Recruit Spies
ZTNA Is The Foundation Of Great VDI Deployments »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

US Cyber Range

US Cyber Range

US Cyber Range is a scalable, cloud-hosted infrastructure providing students with virtual environments for realistic, hands-on cybersecurity labs and exercises.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

Black Girls In Cyber (BGiC)

Black Girls In Cyber (BGiC)

Black Girls In Cyber's mission is to increase industry awareness and diversity in cybersecurity, privacy, and STEM for women of color.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Digital Catapult

Digital Catapult

Digital Catapult is the UK authority on advanced digital technology. We bring out the best in business by accelerating new possibilities with advanced digital technologies.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Aspire Technology Solutions

Aspire Technology Solutions

Aspire is an award-winning IT Managed Service and Cyber Security Provider. We specialise in cyber security, cloud, connectivity, managed services, unified communications and IT support.