Remote Pager Attack Begins A New Era Of Warfare

At least 32 people, including two children, were killed and thousands more injured, many seriously, after communication devices, used by the armed group Hezbollah, dramatically exploded across Lebanon. 

The explosions were precisely targeting the pagers of members of Hezbollah, an anti-Israel Military organisation controlled by the government of Iran.

The pagers were distributed by Hezbollah to its personnel as a secure communications device, following concerns over the security of mobile phones. A day later, Lebanon experienced more deadly blasts as walky-talky radios used by Hezbollah also detonated.

This likely Israeli-directed explosive pager attack on Lebanese terrorist group Hezbollah is something that would not have worked a few years ago.  

The details of how Israeli intelligence supposedly achieved the operation are not fully known. It’s not clear whether Israel's Mossad spy agency set up a dummy company to sell the pagers to Hezbollah, or intercepted consignments of pagers in transit to add the explosives using software capable of responding to a remote command. 

The British defence establishment has long recognised the threat. Indeed, Britain has successfully influenced other major European nations to adopt common security guidelines for domestic Internet-connected devices, such as doorbell cameras or routers. Today, modern data networks, such as those used in 4G or 5G mobile, are increasingly “software defined”, and fears of malicious software update patches were what convinced the UK to join the US in removing Chinese-designed and manufactured Huawei equipment  from its 5G  infrastructure.

The automotive sector has been acutely conscious of the security risks of Internet connected devices a for years, although so far there is no evidence that malicious actors are able to use this type of technology to turn e-bikes or mobile phones into weapons. 

Unherd  |   Gov.UK   |   CNN   |   CNN   |    BBC   |   Washington Post 

Image: Ideogram 

You Might Also Read: 

Smartphones Are More Vulnerable Than You Think:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 





 

« Six Steps On The Road To NIS2 Compliance
Data Centres Given Critical National Infrastructure Status In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.