Israel Responds To A Cyber Attack With Bombs

The Israel Defense Forces (IDF) have bombed a building belonging to Hamas in the Gaza strip in order to thwart an attempted cyber-attack against Israeli targets, the military announced Sunday 5th May.

The IDF hit a building in the Gaza Strip with an airstrike after claiming the site had been used by Hamas cyber operatives to attack Israel’s cyber space and the organisation claimed it had stopped the attack online before launching its airstrike on Hamas. The IDF now claims it has now wiped out Hamas’ cyber operational capabilities. 

The attack targeted the building where Hamas operatives were working, following successful cyber defense measures from Israel, the military said.

Israel Defense Forces said on Twitter, “We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”

This could mark a change in modern cyber warfare tactics, given that it is the first time a cyber-attack has been met with immediate physical retaliation. However, the US is still the first country to respond to cyber-attacks with military force. 
In 2015, the nation launched a drone strike to kill the British national in charge of ISIL's hacker groups Junaid Hussain. Hussain had also dumped personal details of US military forces online.

Now the geo-political dynamics around the world have led us to a stage where cyberattacks are being considered with the utmost of urgency and priority by governments. Israel has confirmed that they have responded to a cyber-attack with full military power. 

The Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives. The building was located in the Gaza Strip, which Israeli fighter jets have now destroyed.

This comes at a time when cyber warfare is gaining even more significance, and many countries are weighing in on multiple response mechanisms. Israel’s response to the cyber-attack on its virtual networks could in a way set a new benchmark for responding to digital warfare that could be designed to compromise the national security of any country. 

The closest any country has come to taking such a step earlier was back in 2015 when the US launched a drone strike against terror group ISIS after a cyber-attack leaked the personal details of US military personnel online. 

News18:         Calcalistech:        Forbes

You Might Also Read:

Mossad Needs Cyber Experts:
 

 

« Snowden Explains Why The CIA Is On Instagram
What Can We Do About Increasing Complexity In Cybersecurity? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.