Online Conflict In Gaza & Ukraine

As the geopolitical landscape changes, the Israeli-Palestinian conflict in Gaza has extended from the physical battleground into the digital domain of warfare. Today, the use of cyber warfare techniques has become an integral part of the ongoing tensions, adding a layer of complexity to an already intricate situation. 

Various hacktivist groups have targeted critical infrastructure, government agencies, and organizations in both Israel and Palestine. 

The attacks include Distributed Denial of Service (DDoS) attacks, defacement attacks and data breaches. As other countries take a stand on the war, the conflict has also spread beyond the immediate region, affecting several other countries. These cyber attacks have contributed to the unfolding events, adding another level of complexity to the ongoing chaos brought on by the Hamas invasion in Israel.

While many of the hacktivist groups might appear unsophisticated in carrying out their attacks, there are some involved with well developed skills. The recent situation in Palestine shares some common characteristics with the war in Ukraine where hacktivist groups have quickly chosen sides and entered the conflict conducting cyber attacks against both the primary antagonists, as well government and private sector supporters.  

There estimated to be at least100 active groups participating in the ongoing “cyber warfare” between Israel and Palestine.  About 20 groups are though to align with Israel, while 77 are supporting the Palestinian side. Some of these groups like KillNet have been engaged in the Ukraine war, demonstrating how geopolitical issues lie behind these hacking activities.  

Hacktivists on both sides have taken to social media and other channels like Telegram to support their side of the ideological struggle, recruiting others, and pushing their own narratives.

So far, the majority of these cyber attacks have been delivered in the form of Distributed Denial-of-Service (DDoS), though other forms are quickly emerging as well.  The victims of these attacks have been media, financial organisations, government, and telecommunications, most of which have a role in disseminating information to domestic and international audiences.  

War In Ukraine

In Ukraine, political and ideological motivated hacktivist activity has expanded past the two primary combatants and targeted governments and even private sector companies supporting a side.  Several hacktivist groups have conducted DDoS attacks against countries that have openly supported Israel to include France, India, Ukraine, and the United States.   

Iranian Hackers

Researchers that observed DDoS originating from Iranian IP addresses has decreased since the beginning of the conflict and one logical explanation may be that they are observing the cyber battlefield trying to see how these attacks are being detected and deflected by Israeli defenders, with the aim of applying this knowledge to future campaigns.

To date, the DDoS attacks on both sides have limited tactical or strategic impact, surprising given the importance given to protecting critical infrastructure, an established target for Iranian hackers, who have successfully disrupted water utilities in Israel.

Despite the Red Cross efforts to create a hacktivist code of conduct in cyberspace that adhere to the basic principles of international humanitarian laws when conducting operations in support of a state, many groups like KillNet have refused to comply. While they may not possess the high level capabilities of nation state hackers, they skilled enough to cause disruption to key industries.  At least, they can obtain the tools they need and collaborate with other more capable sympathisers.

 As well as DDoS exploits, there has been at least one notable incident where a pro-Palestinian group gained access to an app used by Israeli civilians to warn them of impending rocket attacks.  Once compromised, the hackers sent fake rocket alerts and even a fake nuclear launch warning.  There have been other forms of disinformation executed by hacktivists, but most of the claims asserted with respect to attacks they had conducted were not confirmed or substantiated, but still suggest value in spreading fake news.  

As the Palestine conflict continues. it becomes more likely that hacktivist groups will try other forms of more damaging attacks other than defacing websites and DDoS attacks.

Indeed, one pro-Palestinian group has been using a Linux-based wiper malware against Israeli targets.  Wipers were not a frequently used type of malware because they don’t provide an opportunity for an attacker to make a profit. Their main purpose is to cause disruption and destruction, making them a more common tool for nation-state actors and hacktivists.

Wipers Used Againts Ukraine

Numerous wipers were used to disrupt the Ukrainian government, critical infrastructure, and business shortly before Russia's military attack in Ukraine. Wiper malware has proven effectively destructive, often employed to cause, destruction of evidence, and cyber warfare, as it can “wipe” data, overwrite data, or corrupt data.  As more wipers are deployed, other punitive cyber attacks can be expected such as ransomware deployment to lock up systems and steal/distribute stolen data, not make money.  

Hacktivists also engage in doxxing high-value persons for the purpose of exposing their sensitive information that can be leveraged for physical and/or digital targeting. The best indicator of future behavior is past behavior, and the current Palestine conflict bears many geopolitical similarities with the war in Ukraine.

While the current  conflict in Gaza has been going on for only a few weeks, it has the potential to escalate quickly, both in terms of the cyber domain of warfare as well as the truly deadly military actions of kinetic warfare. 

Cyfirma:    CheckPoint:     Imperva:    Oodaloop:    HackerNews:   CPO Magazine:    The Record

FalconFeeds:     Cyber Express:     Image: hosnysalah

You Might Also Read: 

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Bletchley Declaration On Artificial Intelligence Gets International Support
Ransomware Attacks Hit A Record High »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

LRQA

LRQA

LRQA is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.