Remote Pager Attack Begins A New Era Of Warfare

At least 32 people, including two children, were killed and thousands more injured, many seriously, after communication devices, used by the armed group Hezbollah, dramatically exploded across Lebanon. 

The explosions were precisely targeting the pagers of members of Hezbollah, an anti-Israel Military organisation controlled by the government of Iran.

The pagers were distributed by Hezbollah to its personnel as a secure communications device, following concerns over the security of mobile phones. A day later, Lebanon experienced more deadly blasts as walky-talky radios used by Hezbollah also detonated.

This likely Israeli-directed explosive pager attack on Lebanese terrorist group Hezbollah is something that would not have worked a few years ago.  

The details of how Israeli intelligence supposedly achieved the operation are not fully known. It’s not clear whether Israel's Mossad spy agency set up a dummy company to sell the pagers to Hezbollah, or intercepted consignments of pagers in transit to add the explosives using software capable of responding to a remote command. 

The British defence establishment has long recognised the threat. Indeed, Britain has successfully influenced other major European nations to adopt common security guidelines for domestic Internet-connected devices, such as doorbell cameras or routers. Today, modern data networks, such as those used in 4G or 5G mobile, are increasingly “software defined”, and fears of malicious software update patches were what convinced the UK to join the US in removing Chinese-designed and manufactured Huawei equipment  from its 5G  infrastructure.

The automotive sector has been acutely conscious of the security risks of Internet connected devices a for years, although so far there is no evidence that malicious actors are able to use this type of technology to turn e-bikes or mobile phones into weapons. 

Unherd  |   Gov.UK   |   CNN   |   CNN   |    BBC   |   Washington Post 

Image: Ideogram 

You Might Also Read: 

Smartphones Are More Vulnerable Than You Think:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 





 

« Six Steps On The Road To NIS2 Compliance
Data Centres Given Critical National Infrastructure Status In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.