Cyberwar In Israel & Gaza

A wave of hacking attacks on Israeli targets has added a cyber dimension to the conflict with Hamas. The conflict between Israel and its Arab neighbours routinely attracts both intense global interest and politically minded hackers, dubbed hacktivists, who piggyback on the fighting, either to support their side and generate attention.

The most significant measures by the Palestinians may have been the preparation earlier this year, when a  group that Microsoft has names Storm-1133 attacked energy, defence and telecoms companies inside Israel.

More than 100 websites in Israel have been either defaced or temporarily disrupted through simple distributed denial of service attacks (DDoS), which work by flooding a site with a rush of inauthentic traffic, according to security analysts. Hacktivist groups say they are hitting Israeli targets online amid the war in Israel and Gaza, disrupting and defacing websites like the Jerusalem Post."The attackers have managed to knock us offline for extended periods over the past few days," Jerusalem Post editor Avi Mayer told reporters. "This is a blatant assault on freedom of the press."

Hacking groups, including some linked to Russia, are attacking Israeli government and media websites, siding  with Hamas, launched a series of deadly strikes on Israel last week. Many of these groups have previously been focused on the Russian invasion of Ukraine and are  switchingcjing their focus to the Israel-Hamas conflict

One such groups is Killnet, that comprises Russian volunteer hackers, that announced that it would target all Israeli government systems with DDoS traffic and forces to drive them offline. Killnet has blamed Israel for bloodshed in Gaza 

Cyber security firm Group-IB said hackers had compromised a mobile phone application that is used to issue missile alerts to Israeli users during periods of conflict. The hackers exploited a vulnerability in the app to insert fake notifications and inflammatory messages. 

Group-IB said the app since appeared to have been removed from Google’s Play Store, where it had been downloaded 1 million times. 

Group-IB;   Security Affairs:   Reuters:     Bloomberg:   Cybernews:   Guardian:    Washington Post:     

WSJ:    Time:       Image: Nigel Stripe

You Might Also Read: 

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Revealed: CIA Using TwitterX To Recruit Spies
ZTNA Is The Foundation Of Great VDI Deployments »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

CERT Bulgaria (CERT.BG)

CERT Bulgaria (CERT.BG)

CERT Bulfaria is the National Computer Security Incidents Response Team for Bulgaria.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

Umbrella Cyber

Umbrella Cyber

Umbrella Cyber specialises in Cyber Essentials and Cyber Essentials Plus Certification and penetration testing.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.