Hamas Upgrades Cyber Espionage Capability

An American cyber security company founded by an Israeli has identified a new cyber espionage campaign originating in the Gaza Strip and aimed at government ministries in Israel, Arab countries and the Palestinian Authority

Experts say that the infrastructure behind the attacks and the way that different servers have been used to hide their source reveals that the suspected organisation, known as the Gaza Cybergang Group.

This group has upgraded its capability to a level “which would not embarrass countries with reasonable cyber capabilities,” The Marker, an Israelo daily business newspaper reports

The Gaza Cybergang Group is thought to be backed by the Hamas political group which controls the Gaza Strip.

Gangs of hackers sent emails to their targets from a source which looked legitimate, such as a work colleague. The emails contained fake news headlines aimed at encouraging the reader to click on an attached link or file.

Opening of the file triggered installation of a program which sent the computer user’s identifying details to a control center manned by the hackers. If the details were sufficiently interesting, spyware was installed onto the unwitting user’s computer, spyware that could eavesdrop on conversations, read correspondence and operate the camera.

The same group opened a new Internet address, new.gov-il.host, as part of a specific plan to attack the Israeli government.

It was the Israeli development team at Palo Alto Networks which, having noticed repeated attempts to cyber breach different targets in Israel and elsewhere, linked the attacks, servers and tools used to a group of at least 10 hackers operating out of Gaza.

They noticed spelling mistakes in Hebrew and English reminiscent of mistakes made by Hamas in video clips and other written materials. An analysis of the timing revealed that there was no hacking on Fridays, a clear suggestion that the hackers were working a Middle Eastern week.

Fake news items posted as bait included photographs of Israeli Internal Security Minister Gilad Erdan and sports broadcaster Sharon Perry.

The Israeli government’s National Cyber Bureau would not comment on the Gaza attacks. It just said that different sources attempted on a regular basis to break into Israeli organisational networks.

Times Of Israel:

Jihadi Cybercrime:

Cyber Threats To Israel’s Air Traffic Control:

UAE Using Israeli Spy Technology:

« Italy's Foreign Ministry under Cyber Attack
Guide To The Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

Alert Logic

Alert Logic

Alert Logic has more than a decade of experience pioneering and refining cloud solutions that are secure, flexible and designed to work with hosting and cloud service providers.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

TAC Security

TAC Security

TAC Security is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.