Will Hezbollah Launch Cyber Attacks On Israel?

After the attack on Hezbollah personal devices in Lebanon, concerns are growing over the Islamic paramilitary group's potential for retaliatory cyber capabilities against Israel, widely seen as the likely perpetrator, though it remains silent over the incident.,

Hezbollah promised to retaliate against Israel after accusing it of detonating pagers and other radio devices across Lebanon on Tuesday 17th September, killing nine people and wounding nearly 3,000 others. 

The US State Department designated Hezbollah as a foreign terrorist organisation in 1997.

The explosions raised concerns across the region, demonstrating just how vulnerable modern societies have become with increased reliance on internet-connected devices. Details of the pager attack are yet to emerge, although reports suggest the devices were made by a shell company that embedded small, undetectable explosives inside. 

Hezbollah swiftly responded with a massive rocket barrage on northern Israel. However, the Iranian-backed group is also believed to have cyber capabilities that could be used in retaliation. Hezbollah is considered one of Israel’s most formidable enemies, with precision-guided missiles, well-trained troops, and cyber capabilities built over two decades. Experts say Hezbollah and Iran are also involved in global drug trafficking, using those funds to finance constant upgrades to their cyber capabilities. 

Cyber incidents have notably increased across the Middle East and according to Israel's National Cyber Directorate,  cyber-attacks shifted from data leaks and influence campaigns to causing disruption and damage. 
They identified 800 “significant incidents” between the start of the war and the end of 2023.

These incidents included attacks on critical infrastructure as well as individual targets, which have been attributed to Iranian threat groups

During this time, efforts were made to reduce vulnerabilities in hospital systems and control centres in the energy and water sectors, while also strengthening resilience in around 160 local authorities and supply chain entities.

In the early weeks of the war, Israel accused Iran and Hezbollah of attempting a cyberattack on a hospital in northern Israel. The attack was thwarted before it could disrupt hospital operations, but the National Cyber Directorate confirmed that “sensitive information” had been stolen from the hospital’s systems.

Neither side is immune to cyber attacks or operations like the pager attack in Lebanon, and both are racing to prevent attacks while targeting each other.

JPost   |   Economic Times   |    AlJazeera   |   Reuters   |   CBS 

Image: @SquadShia

You Might Also Read:

Israel-Hamas Conflict: The Escalation Of Cyberwarfare:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




 

« The Key Issues For SME Cyber Security 
British Railway Passengers Attacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

VdS

VdS

VdS is an independent safety and security testing institution. Cybersecurity services include standards, audit/assessment and certification for SMEs.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.