Israel Responds To A Cyber Attack With Bombs

The Israel Defense Forces (IDF) have bombed a building belonging to Hamas in the Gaza strip in order to thwart an attempted cyber-attack against Israeli targets, the military announced Sunday 5th May.

The IDF hit a building in the Gaza Strip with an airstrike after claiming the site had been used by Hamas cyber operatives to attack Israel’s cyber space and the organisation claimed it had stopped the attack online before launching its airstrike on Hamas. The IDF now claims it has now wiped out Hamas’ cyber operational capabilities. 

The attack targeted the building where Hamas operatives were working, following successful cyber defense measures from Israel, the military said.

Israel Defense Forces said on Twitter, “We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”

This could mark a change in modern cyber warfare tactics, given that it is the first time a cyber-attack has been met with immediate physical retaliation. However, the US is still the first country to respond to cyber-attacks with military force. 
In 2015, the nation launched a drone strike to kill the British national in charge of ISIL's hacker groups Junaid Hussain. Hussain had also dumped personal details of US military forces online.

Now the geo-political dynamics around the world have led us to a stage where cyberattacks are being considered with the utmost of urgency and priority by governments. Israel has confirmed that they have responded to a cyber-attack with full military power. 

The Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives. The building was located in the Gaza Strip, which Israeli fighter jets have now destroyed.

This comes at a time when cyber warfare is gaining even more significance, and many countries are weighing in on multiple response mechanisms. Israel’s response to the cyber-attack on its virtual networks could in a way set a new benchmark for responding to digital warfare that could be designed to compromise the national security of any country. 

The closest any country has come to taking such a step earlier was back in 2015 when the US launched a drone strike against terror group ISIS after a cyber-attack leaked the personal details of US military personnel online. 

News18:         Calcalistech:        Forbes

You Might Also Read:

Mossad Needs Cyber Experts:
 

 

« Snowden Explains Why The CIA Is On Instagram
What Can We Do About Increasing Complexity In Cybersecurity? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

Panasonic Automotive Systems

Panasonic Automotive Systems

Panasonic Automotive Systems brings together security technologies and human resources cultivated across an extensive range of businesses into the automotive field.