Israel Hits Back At Hamas Cyber Attackers

 Israel has carried out a military airstrike in response to an attempted cyber-attack launched by terrorist group Hamas. Israeli warplanes stopped an attempted Hamas cyber-attack, with airstrike that ‘removed’ its HQ.

It is thought to be the first time that a nation-state has retaliated with physical military action in real time against a cyber-attack. But an airstrike should come as no surprise. Ever since 2011 the United States for example said it reserved the right to retaliate with military force against a cyber-attack from a hostile state.

Cyber Defence

News that Israel had used warplanes against cyber attackers came after the Israel Defense Force (IDF) tweeted the news.

“We thwarted an attempted Hamas cyber offensive against Israeli targets,” the IDF tweeted. “Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”

At the weekend there had been a flurry of attacks between Hamas and the IDF. Hamas reportedly fired more than 600 rockets into Israel, killing four people and injuring dozens. The IDF carried out its own strikes against hundreds of what it characterised as military targets, with at least 27 Palestinians reportedly killed.

This included the airstrike against the cyber operation of Hamas, apparently housed in a building in the Gaza Strip. The Hamas cyber-attack operation was reportedly not sophisticated and there is no news on what targets inside Israel were targeted.

Cyber Warfare

The news that Israel has carried out a military strike against hackers is a noteworthy development in the cyber security landscape. Last year President Donald Trump reportedly reduced the rules to be followed and relaxed the complex guidelines that have to be followed if the United States were to launch a cyber-attack against a rogue nation. All of this comes amid concern in Washington and the West that Russia is no longer concerned about its hacking activities remaining covert.

The UK has also been beefing up its cyber operations.

Indeed, the UK has at least doubled its cyber-attacks in recent years, as GCHQ ramped up its ability to hit back at those launching cyber-attacks against this country. This is one of many findings in an official report from the Intelligence and Security Committee of Parliament (ISC), the cross-party body of nine parliamentarians from the Commons and the Lords, tasked with overseeing the work of British intelligence agencies.

“Many of the current cyber threats facing the UK involve damage to the economy, individual prosperity or privacy. However, increasingly there is a risk of physical damage in the ‘real world’.

The number of devices, processes and functions connected to the internet, ranging from parts of the Critical National Infrastructure to WiFi-enabled domestic appliances, has grown exponentially in recent years.

“The Internet of Things (IoT) is a term used to refer to physical devices (including home appliances, vehicles and buildings) embedded with electronics, software, sensors and network connectivity that enables them to collect and exchange data, and that connectivity makes them vulnerable to cyber-attack with potential for direct ‘real-world’ impact.”

The report, part of it have been redacted, also pointed out that the UK is facing a diverse range of cyber threats including from state actors (Russia, China, Iran, North Korea etc), to organised crime groups and terrorist organisations, as well as individual criminals.

In April 2018 the UK made a rare public admission that it had carried out a cyber-attack on the Islamic State terrorist group. The statement, by the Director of the Intelligence Agency GCHQ Jeremy Fleming, is the first time that the UK has specifically eroded the online efforts of an enemy in a military campaign.

Silicon 1            Silicon 2        Silicon 3 

You Might Also Read:

Israel Responds To A Cyber Attack With Bombs:

 

« Israel Finds It Has Numerous Cyber Vulnerabilities
Young Hacker Makes $1m. Legally. »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

National Cyber-Forensics & Training Alliance (NCFTA) - USA

National Cyber-Forensics & Training Alliance (NCFTA) - USA

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER) - USA

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER) - USA

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.