Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

Israel’s Iron Dome defence system has long shielded it from incoming missiles and defend against incoming aerial attacks. Now, it is building a 'cyber dome' to defend against online attacks,  particularly from Iran.

The Israeli National Cyber Directorate’s head of international cooperation, Aviram Atzaba, said in an interview that this is a silent, invisible war and that while they are ” trying to hack everything they can,” so far “they have not succeeded in causing any real damage.” 

"It is a silent war, one which is not visible... For the past two years, we have been developing a cyber dome against cyberattacks, which functions like the Iron Dome against rockets." Atzaba said.

While Israel has fought Hamas in Gaza since October 7th, it has also been facing a significant increase in cyber attacks from Iran and its allies. According to Atzaba,  around 800 significant attacks targeting government organisations, the military, and civil infrastructures have been defeated. 

While Israel already has robust cyber defences, these consist of local, unconnected efforts and the directorate has been working to build a centralised, real-time system that works proactively to protect Israeli cyberspace.

Iran welcomed Hamas’s attack on Israel, and regional tensions have increased to unprecedented levels, particularly after Iran fired hundreds of missiles directly at Israel for the first time, in retaliation for a deadly Israeli air strike on the Iranian consulate in Damascus.

Former Israeli deputy national advisor,  Professor Chuck Freilich has described Iran is “an impressive enemy” with powerful offensive cyber capabilities. Freilich describes Iranian attacks as being intended not only to disable critical infrastructure, but also to collect data for intelligence and spread false information for propaganda purposes. Freilich considers that Iran's cyber capabilities are likely to improve with assistance from Russia and China, as well an emphasis on cyber training for students and soldiers, adding that the trend was “concerning for the future”.

Iran's investment in cyberwar capabilities was  prompted by the Stuxnet  attack in 2010 that inflicted physical damage on Iran's nuclear program. The Stuxnet was widely attributed to Israel in cooperation with the US. 

The Israeli system has various scanners that continuously monitor Israeli cyberspace for vulnerabilities and inform those at risk of the means to mitigate them. Israel’s cyber strength relies on close cooperation between the public, private and academic sectors, as well as Israel’s “white hat” hackers who help identify weaknesses.

“With cyber dome, all sources are fed into a large data pool that enables a view of the big picture and to invoke a national response in a comprehensive and coordinated manner.” according to Freilich. Of course, Israel is not the sole target of Iranian cyber attacks, with Iranian hackers also attacking US government and numerous private sector companies.  

I-HIS     |     France 24     |     Iran International     |     Hurriyet Daily News     |     Arab News     |     Khaleej Times   |

Iran International     |     CTech     |     Turkiye Newspaper     |     AFP

Image: Mohamed Nohassi

You Might Also Read: 

Iranian Hackers Targeted Israel’s Radar Systems:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Russia’s Malicious Cyber Activity Condemned
Notorious Cyber Criminal Sentenced »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Winslow Technology Group (WTG)

Winslow Technology Group (WTG)

Winslow Technology Group is a leading provider of IT Solutions, Managed Services, and Cybersecurity Services dedicated to providing exceptional business outcomes for our customers since 2003.