Remote Pager Attack Begins A New Era Of Warfare

At least 32 people, including two children, were killed and thousands more injured, many seriously, after communication devices, used by the armed group Hezbollah, dramatically exploded across Lebanon. 

The explosions were precisely targeting the pagers of members of Hezbollah, an anti-Israel Military organisation controlled by the government of Iran.

The pagers were distributed by Hezbollah to its personnel as a secure communications device, following concerns over the security of mobile phones. A day later, Lebanon experienced more deadly blasts as walky-talky radios used by Hezbollah also detonated.

This likely Israeli-directed explosive pager attack on Lebanese terrorist group Hezbollah is something that would not have worked a few years ago.  

The details of how Israeli intelligence supposedly achieved the operation are not fully known. It’s not clear whether Israel's Mossad spy agency set up a dummy company to sell the pagers to Hezbollah, or intercepted consignments of pagers in transit to add the explosives using software capable of responding to a remote command. 

The British defence establishment has long recognised the threat. Indeed, Britain has successfully influenced other major European nations to adopt common security guidelines for domestic Internet-connected devices, such as doorbell cameras or routers. Today, modern data networks, such as those used in 4G or 5G mobile, are increasingly “software defined”, and fears of malicious software update patches were what convinced the UK to join the US in removing Chinese-designed and manufactured Huawei equipment  from its 5G  infrastructure.

The automotive sector has been acutely conscious of the security risks of Internet connected devices a for years, although so far there is no evidence that malicious actors are able to use this type of technology to turn e-bikes or mobile phones into weapons. 

Unherd  |   Gov.UK   |   CNN   |   CNN   |    BBC   |   Washington Post 

Image: Ideogram 

You Might Also Read: 

Smartphones Are More Vulnerable Than You Think:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 





 

« Six Steps On The Road To NIS2 Compliance
Data Centres Given Critical National Infrastructure Status In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

VP Techno Labs

VP Techno Labs

VP Techno Labs is an award-winning cybersecurity firm focusing only cybersecurity to develop cutting edge solutions for emerging business.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Corgea

Corgea

Corgea is AI-powered security platform that finds, triages and fixes your insecure code.