Israel Hits Back At Hamas Cyber Attackers

 Israel has carried out a military airstrike in response to an attempted cyber-attack launched by terrorist group Hamas. Israeli warplanes stopped an attempted Hamas cyber-attack, with airstrike that ‘removed’ its HQ.

It is thought to be the first time that a nation-state has retaliated with physical military action in real time against a cyber-attack. But an airstrike should come as no surprise. Ever since 2011 the United States for example said it reserved the right to retaliate with military force against a cyber-attack from a hostile state.

Cyber Defence

News that Israel had used warplanes against cyber attackers came after the Israel Defense Force (IDF) tweeted the news.

“We thwarted an attempted Hamas cyber offensive against Israeli targets,” the IDF tweeted. “Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”

At the weekend there had been a flurry of attacks between Hamas and the IDF. Hamas reportedly fired more than 600 rockets into Israel, killing four people and injuring dozens. The IDF carried out its own strikes against hundreds of what it characterised as military targets, with at least 27 Palestinians reportedly killed.

This included the airstrike against the cyber operation of Hamas, apparently housed in a building in the Gaza Strip. The Hamas cyber-attack operation was reportedly not sophisticated and there is no news on what targets inside Israel were targeted.

Cyber Warfare

The news that Israel has carried out a military strike against hackers is a noteworthy development in the cyber security landscape. Last year President Donald Trump reportedly reduced the rules to be followed and relaxed the complex guidelines that have to be followed if the United States were to launch a cyber-attack against a rogue nation. All of this comes amid concern in Washington and the West that Russia is no longer concerned about its hacking activities remaining covert.

The UK has also been beefing up its cyber operations.

Indeed, the UK has at least doubled its cyber-attacks in recent years, as GCHQ ramped up its ability to hit back at those launching cyber-attacks against this country. This is one of many findings in an official report from the Intelligence and Security Committee of Parliament (ISC), the cross-party body of nine parliamentarians from the Commons and the Lords, tasked with overseeing the work of British intelligence agencies.

“Many of the current cyber threats facing the UK involve damage to the economy, individual prosperity or privacy. However, increasingly there is a risk of physical damage in the ‘real world’.

The number of devices, processes and functions connected to the internet, ranging from parts of the Critical National Infrastructure to WiFi-enabled domestic appliances, has grown exponentially in recent years.

“The Internet of Things (IoT) is a term used to refer to physical devices (including home appliances, vehicles and buildings) embedded with electronics, software, sensors and network connectivity that enables them to collect and exchange data, and that connectivity makes them vulnerable to cyber-attack with potential for direct ‘real-world’ impact.”

The report, part of it have been redacted, also pointed out that the UK is facing a diverse range of cyber threats including from state actors (Russia, China, Iran, North Korea etc), to organised crime groups and terrorist organisations, as well as individual criminals.

In April 2018 the UK made a rare public admission that it had carried out a cyber-attack on the Islamic State terrorist group. The statement, by the Director of the Intelligence Agency GCHQ Jeremy Fleming, is the first time that the UK has specifically eroded the online efforts of an enemy in a military campaign.

Silicon 1            Silicon 2        Silicon 3 

You Might Also Read:

Israel Responds To A Cyber Attack With Bombs:

 

« Israel Finds It Has Numerous Cyber Vulnerabilities
Young Hacker Makes $1m. Legally. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.