Israel Responds To A Cyber Attack With Bombs

The Israel Defense Forces (IDF) have bombed a building belonging to Hamas in the Gaza strip in order to thwart an attempted cyber-attack against Israeli targets, the military announced Sunday 5th May.

The IDF hit a building in the Gaza Strip with an airstrike after claiming the site had been used by Hamas cyber operatives to attack Israel’s cyber space and the organisation claimed it had stopped the attack online before launching its airstrike on Hamas. The IDF now claims it has now wiped out Hamas’ cyber operational capabilities. 

The attack targeted the building where Hamas operatives were working, following successful cyber defense measures from Israel, the military said.

Israel Defense Forces said on Twitter, “We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”

This could mark a change in modern cyber warfare tactics, given that it is the first time a cyber-attack has been met with immediate physical retaliation. However, the US is still the first country to respond to cyber-attacks with military force. 
In 2015, the nation launched a drone strike to kill the British national in charge of ISIL's hacker groups Junaid Hussain. Hussain had also dumped personal details of US military forces online.

Now the geo-political dynamics around the world have led us to a stage where cyberattacks are being considered with the utmost of urgency and priority by governments. Israel has confirmed that they have responded to a cyber-attack with full military power. 

The Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives. The building was located in the Gaza Strip, which Israeli fighter jets have now destroyed.

This comes at a time when cyber warfare is gaining even more significance, and many countries are weighing in on multiple response mechanisms. Israel’s response to the cyber-attack on its virtual networks could in a way set a new benchmark for responding to digital warfare that could be designed to compromise the national security of any country. 

The closest any country has come to taking such a step earlier was back in 2015 when the US launched a drone strike against terror group ISIS after a cyber-attack leaked the personal details of US military personnel online. 

News18:         Calcalistech:        Forbes

You Might Also Read:

Mossad Needs Cyber Experts:
 

 

« Snowden Explains Why The CIA Is On Instagram
What Can We Do About Increasing Complexity In Cybersecurity? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Ampyx Cyber

Ampyx Cyber

Ampyx Cyber (formerly Ampere Industrial Security) is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Commission Nationale de l'Informatique et des Libertés (CNIL) - France

Commission Nationale de l'Informatique et des Libertés (CNIL) - France

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).

QualySec

QualySec

QualySec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services.

The Missing Link

The Missing Link

Whether your requirements are large or small, The Missing Link have you covered with our core offerings including IT & Cloud, Cyber Security and Automation.

Darknetsearch by Kaduu

Darknetsearch by Kaduu

Our dark web and deep web monitoring continuously tracks confidential data across dark web markets, telegram channels, paste sites, botnet logs, IRC, social media and other sources.