Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

Israel’s Iron Dome defence system has long shielded it from incoming missiles and defend against incoming aerial attacks. Now, it is building a 'cyber dome' to defend against online attacks,  particularly from Iran.

The Israeli National Cyber Directorate’s head of international cooperation, Aviram Atzaba, said in an interview that this is a silent, invisible war and that while they are ” trying to hack everything they can,” so far “they have not succeeded in causing any real damage.” 

"It is a silent war, one which is not visible... For the past two years, we have been developing a cyber dome against cyberattacks, which functions like the Iron Dome against rockets." Atzaba said.

While Israel has fought Hamas in Gaza since October 7th, it has also been facing a significant increase in cyber attacks from Iran and its allies. According to Atzaba,  around 800 significant attacks targeting government organisations, the military, and civil infrastructures have been defeated. 

While Israel already has robust cyber defences, these consist of local, unconnected efforts and the directorate has been working to build a centralised, real-time system that works proactively to protect Israeli cyberspace.

Iran welcomed Hamas’s attack on Israel, and regional tensions have increased to unprecedented levels, particularly after Iran fired hundreds of missiles directly at Israel for the first time, in retaliation for a deadly Israeli air strike on the Iranian consulate in Damascus.

Former Israeli deputy national advisor,  Professor Chuck Freilich has described Iran is “an impressive enemy” with powerful offensive cyber capabilities. Freilich describes Iranian attacks as being intended not only to disable critical infrastructure, but also to collect data for intelligence and spread false information for propaganda purposes. Freilich considers that Iran's cyber capabilities are likely to improve with assistance from Russia and China, as well an emphasis on cyber training for students and soldiers, adding that the trend was “concerning for the future”.

Iran's investment in cyberwar capabilities was  prompted by the Stuxnet  attack in 2010 that inflicted physical damage on Iran's nuclear program. The Stuxnet was widely attributed to Israel in cooperation with the US. 

The Israeli system has various scanners that continuously monitor Israeli cyberspace for vulnerabilities and inform those at risk of the means to mitigate them. Israel’s cyber strength relies on close cooperation between the public, private and academic sectors, as well as Israel’s “white hat” hackers who help identify weaknesses.

“With cyber dome, all sources are fed into a large data pool that enables a view of the big picture and to invoke a national response in a comprehensive and coordinated manner.” according to Freilich. Of course, Israel is not the sole target of Iranian cyber attacks, with Iranian hackers also attacking US government and numerous private sector companies.  

I-HIS     |     France 24     |     Iran International     |     Hurriyet Daily News     |     Arab News     |     Khaleej Times   |

Iran International     |     CTech     |     Turkiye Newspaper     |     AFP

Image: Mohamed Nohassi

You Might Also Read: 

Iranian Hackers Targeted Israel’s Radar Systems:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Russia’s Malicious Cyber Activity Condemned
Notorious Cyber Criminal Sentenced »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Data Privacy Office (DPO)

Data Privacy Office (DPO)

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.