How Credible is the Anonymous Threat to Israel?

Image result for Anonymous threaten to "erase Israel from cyberspace."

A warning has been issued for the state of Israel, allegedly from the hacking collective "Anonymous," in a new video in which they threaten to "erase the country from cyberspace."
Citing what the hackers called "continuous aggression, bombing, killing, and kidnapping of the Palestinian people," the group vowed to unleash cyber "squadrons" that will launch what the video referred to as a "cyber holocaust" that the speaker announces will occur in April. The attack is scheduled to occur before Israel's Holocaust remembrance day, known as Yom HaShoah, which takes place on April 16. 
The volume of cyber attacks by hackers is on the rise in Israel – and surged during Operation Protective Edge (the 1.5 month-long Palestinian-Israeli conflict) last summer, when Isaac Ben-Israel of Tel Aviv University says cyber attacks grew by 900 percent. These attacks were attributed to anti-Israeli hackers among its Arab neighbors, operating under a hacking umbrella Israeli authorities referred to as Op-Israel – hackers who have been influenced by various Islamist organizations, according to the Times of Israel. 
“Instead of the usual 100,000 attacks we get each day, we were now getting a million such attacks from all over the Arab and Muslim world,” he told the Israeli news website.  
It should be noted that Anonymous hackers receive marching orders from no single authority. Fellow "Anons" have to strike a balance between maintaining their web identities and cyber footprints anonymous to authorities online, all while communicating operational messages to other hackers, according to Wired. In this case, the likely Arab hackers, according to Daniel Cohen, a research associate at the Israel Institute for National Security Studies (INSS) Cyber Warfare program, have been identified by Israeli cyber defense teams as hacking on behalf of Islamist interests.
The nature of "Anonymous" as a brand means that those hackers using the name vary widely in terms of their goals, targets, and location. David Kushner of the New Yorker wrote in his profile of the Anonymous, "There was no membership fee or initiation. Anyone who wanted to be a part of Anonymous—an Anon—could simply claim allegiance." 
And the relative unity the group enjoyed in the past may be fracturing. As The Christian Science Monitor reported:
There's now a growing divide between various partisans that claim the Anonymous moniker: The North American contingent is increasingly isolated by the rest of the community as Anonymous gains more traction in Europe, Asia, and Latin America.
This fissure, or lack of control over the movement, has been a few years in the making, but was most apparent after the Charlie Hebdo killings in Paris. In the wake of the January terrorist attack, European members of Anonymous pushed for online revenge attacks on Islamic militant website under the hashtag #OpCharlieHebdo....
Established North American Anonymous accounts ignored, criticized, or mocked #OpCharlieHebdo and #OpISIS. Other American mouthpieces dismissed it as a “false flag,” meaning it was orchestrated by the CIA or some other government to distract from more important issues, damage Anonymous’ reputation or to instigate unrest for political purposes. ...
This loss of influence over the collective is reflective of how global politics are playing out within the darker corners of the Internet where Anonymous and likeminded hackers spend time. The Edward Snowden leaks that revealed pervasive National Security Agency monitoring of the Internet has led to a deep distrust of American Anonymous members.
"The ‘anti-American’ sentiments have become more and more a part of our conversations,” said Raymond Johansen, a global privacy activist on the FreeAnons Advisory board dedicated to freeing imprisoned Anonymous hacktivists. Anonymous was thought to be compromised in 2011 when the American government arrested Hector Xavier Monsegur, known as Sabu, and he began to informing on other Anonymous hackers, according to Wired. Sabu's arrest disrupted a successful string of hacks between 2008 and 2012, according to Business Insider. These attacks included taking down the Westboro Baptist Church's website. During this time period, Anonymous also launched Operation DarkNet, the group's anti-child pornography campaign. 

"It's not like you throw them in jail and they disappear," Mark Rasch a former federal cybercrimes prosecutor, told Wired. "It's sort of like squeezing Jell-O. It just moves somewhere else." 
So, does the "Anonymous" faction threatening Israel pose a credible risk?
“For the most part, this is posturing. This is actually the fourth year that Anonymous has carried out this Op Israel attack and called on their supporters to erase Israel from the internet,” Benjamin T. Decker, an intelligence analyst at the Tel Aviv-based consultancy the Levantine Group, told Newsweek. “As the years have progressed we have seen that, despite their increasing sophistication in hacking techniques, we have seen less damage against Israeli cyber infrastructures, largely due to Israel’s pioneering of most cyber warfare tactics, both offensive and defensive.”
One such attack occurred in 2013, launched by Op_Israel in which supposed Arab hackers, under the Anonymous rubric, claimed to cause some $3 billion in damage, Haaretz reported. The hack targeted more than 100,000 websites, 40,000 Facebook pages, 5,000 Twitter accounts and 30,000 Israeli bank accounts, according to the report.
The government claimed no major disruptions occurred, but the hack resulted in some websites being blocked and a handful of officials' contact information and other personal data posted online, according to Haaretz.
Ein News: http://ow.ly/LnRsD

« Commando Bugs
Snowden Explains Exactly How the US Government Can Get Access to Private Images »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.