Cyberwar In Israel & Gaza

A wave of hacking attacks on Israeli targets has added a cyber dimension to the conflict with Hamas. The conflict between Israel and its Arab neighbours routinely attracts both intense global interest and politically minded hackers, dubbed hacktivists, who piggyback on the fighting, either to support their side and generate attention.

The most significant measures by the Palestinians may have been the preparation earlier this year, when a  group that Microsoft has names Storm-1133 attacked energy, defence and telecoms companies inside Israel.

More than 100 websites in Israel have been either defaced or temporarily disrupted through simple distributed denial of service attacks (DDoS), which work by flooding a site with a rush of inauthentic traffic, according to security analysts. Hacktivist groups say they are hitting Israeli targets online amid the war in Israel and Gaza, disrupting and defacing websites like the Jerusalem Post."The attackers have managed to knock us offline for extended periods over the past few days," Jerusalem Post editor Avi Mayer told reporters. "This is a blatant assault on freedom of the press."

Hacking groups, including some linked to Russia, are attacking Israeli government and media websites, siding  with Hamas, launched a series of deadly strikes on Israel last week. Many of these groups have previously been focused on the Russian invasion of Ukraine and are  switchingcjing their focus to the Israel-Hamas conflict

One such groups is Killnet, that comprises Russian volunteer hackers, that announced that it would target all Israeli government systems with DDoS traffic and forces to drive them offline. Killnet has blamed Israel for bloodshed in Gaza 

Cyber security firm Group-IB said hackers had compromised a mobile phone application that is used to issue missile alerts to Israeli users during periods of conflict. The hackers exploited a vulnerability in the app to insert fake notifications and inflammatory messages. 

Group-IB said the app since appeared to have been removed from Google’s Play Store, where it had been downloaded 1 million times. 

Group-IB;   Security Affairs:   Reuters:     Bloomberg:   Cybernews:   Guardian:    Washington Post:     

WSJ:    Time:       Image: Nigel Stripe

You Might Also Read: 

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Revealed: CIA Using TwitterX To Recruit Spies
ZTNA Is The Foundation Of Great VDI Deployments »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.

Mitigata

Mitigata

Welcome to Mitigata, your premier partner in cybersecurity insurance, defence, compliance, and consultancy.