Israel Hits Back At Hamas Cyber Attackers

 Israel has carried out a military airstrike in response to an attempted cyber-attack launched by terrorist group Hamas. Israeli warplanes stopped an attempted Hamas cyber-attack, with airstrike that ‘removed’ its HQ.

It is thought to be the first time that a nation-state has retaliated with physical military action in real time against a cyber-attack. But an airstrike should come as no surprise. Ever since 2011 the United States for example said it reserved the right to retaliate with military force against a cyber-attack from a hostile state.

Cyber Defence

News that Israel had used warplanes against cyber attackers came after the Israel Defense Force (IDF) tweeted the news.

“We thwarted an attempted Hamas cyber offensive against Israeli targets,” the IDF tweeted. “Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”

At the weekend there had been a flurry of attacks between Hamas and the IDF. Hamas reportedly fired more than 600 rockets into Israel, killing four people and injuring dozens. The IDF carried out its own strikes against hundreds of what it characterised as military targets, with at least 27 Palestinians reportedly killed.

This included the airstrike against the cyber operation of Hamas, apparently housed in a building in the Gaza Strip. The Hamas cyber-attack operation was reportedly not sophisticated and there is no news on what targets inside Israel were targeted.

Cyber Warfare

The news that Israel has carried out a military strike against hackers is a noteworthy development in the cyber security landscape. Last year President Donald Trump reportedly reduced the rules to be followed and relaxed the complex guidelines that have to be followed if the United States were to launch a cyber-attack against a rogue nation. All of this comes amid concern in Washington and the West that Russia is no longer concerned about its hacking activities remaining covert.

The UK has also been beefing up its cyber operations.

Indeed, the UK has at least doubled its cyber-attacks in recent years, as GCHQ ramped up its ability to hit back at those launching cyber-attacks against this country. This is one of many findings in an official report from the Intelligence and Security Committee of Parliament (ISC), the cross-party body of nine parliamentarians from the Commons and the Lords, tasked with overseeing the work of British intelligence agencies.

“Many of the current cyber threats facing the UK involve damage to the economy, individual prosperity or privacy. However, increasingly there is a risk of physical damage in the ‘real world’.

The number of devices, processes and functions connected to the internet, ranging from parts of the Critical National Infrastructure to WiFi-enabled domestic appliances, has grown exponentially in recent years.

“The Internet of Things (IoT) is a term used to refer to physical devices (including home appliances, vehicles and buildings) embedded with electronics, software, sensors and network connectivity that enables them to collect and exchange data, and that connectivity makes them vulnerable to cyber-attack with potential for direct ‘real-world’ impact.”

The report, part of it have been redacted, also pointed out that the UK is facing a diverse range of cyber threats including from state actors (Russia, China, Iran, North Korea etc), to organised crime groups and terrorist organisations, as well as individual criminals.

In April 2018 the UK made a rare public admission that it had carried out a cyber-attack on the Islamic State terrorist group. The statement, by the Director of the Intelligence Agency GCHQ Jeremy Fleming, is the first time that the UK has specifically eroded the online efforts of an enemy in a military campaign.

Silicon 1            Silicon 2        Silicon 3 

You Might Also Read:

Israel Responds To A Cyber Attack With Bombs:

 

« Israel Finds It Has Numerous Cyber Vulnerabilities
Young Hacker Makes $1m. Legally. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Bounga Informatics

Bounga Informatics

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Onsist

Onsist

Onsist brand protection services provide proactive defense against fraudulent use of your brand online.

AmWINS Group

AmWINS Group

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

Credible Digital Security Pvt. Ltd. (CDSPL)

Credible Digital Security Pvt. Ltd. (CDSPL)

CDSPL is an innovative Cyber Security Services Company in India. We are committed to offering cyber security solutions for important sectors such as energy and utilities, healthcare, and more.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.