Hamas Upgrades Cyber Espionage Capability

An American cyber security company founded by an Israeli has identified a new cyber espionage campaign originating in the Gaza Strip and aimed at government ministries in Israel, Arab countries and the Palestinian Authority

Experts say that the infrastructure behind the attacks and the way that different servers have been used to hide their source reveals that the suspected organisation, known as the Gaza Cybergang Group.

This group has upgraded its capability to a level “which would not embarrass countries with reasonable cyber capabilities,” The Marker, an Israelo daily business newspaper reports

The Gaza Cybergang Group is thought to be backed by the Hamas political group which controls the Gaza Strip.

Gangs of hackers sent emails to their targets from a source which looked legitimate, such as a work colleague. The emails contained fake news headlines aimed at encouraging the reader to click on an attached link or file.

Opening of the file triggered installation of a program which sent the computer user’s identifying details to a control center manned by the hackers. If the details were sufficiently interesting, spyware was installed onto the unwitting user’s computer, spyware that could eavesdrop on conversations, read correspondence and operate the camera.

The same group opened a new Internet address, new.gov-il.host, as part of a specific plan to attack the Israeli government.

It was the Israeli development team at Palo Alto Networks which, having noticed repeated attempts to cyber breach different targets in Israel and elsewhere, linked the attacks, servers and tools used to a group of at least 10 hackers operating out of Gaza.

They noticed spelling mistakes in Hebrew and English reminiscent of mistakes made by Hamas in video clips and other written materials. An analysis of the timing revealed that there was no hacking on Fridays, a clear suggestion that the hackers were working a Middle Eastern week.

Fake news items posted as bait included photographs of Israeli Internal Security Minister Gilad Erdan and sports broadcaster Sharon Perry.

The Israeli government’s National Cyber Bureau would not comment on the Gaza attacks. It just said that different sources attempted on a regular basis to break into Israeli organisational networks.

Times Of Israel:

Jihadi Cybercrime:

Cyber Threats To Israel’s Air Traffic Control:

UAE Using Israeli Spy Technology:

« Italy's Foreign Ministry under Cyber Attack
Guide To The Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Rhodian Group

Rhodian Group

Rhodian Group (formerly Adar) specialize in providing Technology, Cybersecurity, and Compliance services to the insurance industry.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.