Cyberwar In Israel & Gaza

A wave of hacking attacks on Israeli targets has added a cyber dimension to the conflict with Hamas. The conflict between Israel and its Arab neighbours routinely attracts both intense global interest and politically minded hackers, dubbed hacktivists, who piggyback on the fighting, either to support their side and generate attention.

The most significant measures by the Palestinians may have been the preparation earlier this year, when a  group that Microsoft has names Storm-1133 attacked energy, defence and telecoms companies inside Israel.

More than 100 websites in Israel have been either defaced or temporarily disrupted through simple distributed denial of service attacks (DDoS), which work by flooding a site with a rush of inauthentic traffic, according to security analysts. Hacktivist groups say they are hitting Israeli targets online amid the war in Israel and Gaza, disrupting and defacing websites like the Jerusalem Post."The attackers have managed to knock us offline for extended periods over the past few days," Jerusalem Post editor Avi Mayer told reporters. "This is a blatant assault on freedom of the press."

Hacking groups, including some linked to Russia, are attacking Israeli government and media websites, siding  with Hamas, launched a series of deadly strikes on Israel last week. Many of these groups have previously been focused on the Russian invasion of Ukraine and are  switchingcjing their focus to the Israel-Hamas conflict

One such groups is Killnet, that comprises Russian volunteer hackers, that announced that it would target all Israeli government systems with DDoS traffic and forces to drive them offline. Killnet has blamed Israel for bloodshed in Gaza 

Cyber security firm Group-IB said hackers had compromised a mobile phone application that is used to issue missile alerts to Israeli users during periods of conflict. The hackers exploited a vulnerability in the app to insert fake notifications and inflammatory messages. 

Group-IB said the app since appeared to have been removed from Google’s Play Store, where it had been downloaded 1 million times. 

Group-IB;   Security Affairs:   Reuters:     Bloomberg:   Cybernews:   Guardian:    Washington Post:     

WSJ:    Time:       Image: Nigel Stripe

You Might Also Read: 

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Revealed: CIA Using TwitterX To Recruit Spies
ZTNA Is The Foundation Of Great VDI Deployments »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.