Israel Responds To A Cyber Attack With Bombs

The Israel Defense Forces (IDF) have bombed a building belonging to Hamas in the Gaza strip in order to thwart an attempted cyber-attack against Israeli targets, the military announced Sunday 5th May.

The IDF hit a building in the Gaza Strip with an airstrike after claiming the site had been used by Hamas cyber operatives to attack Israel’s cyber space and the organisation claimed it had stopped the attack online before launching its airstrike on Hamas. The IDF now claims it has now wiped out Hamas’ cyber operational capabilities. 

The attack targeted the building where Hamas operatives were working, following successful cyber defense measures from Israel, the military said.

Israel Defense Forces said on Twitter, “We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”

This could mark a change in modern cyber warfare tactics, given that it is the first time a cyber-attack has been met with immediate physical retaliation. However, the US is still the first country to respond to cyber-attacks with military force. 
In 2015, the nation launched a drone strike to kill the British national in charge of ISIL's hacker groups Junaid Hussain. Hussain had also dumped personal details of US military forces online.

Now the geo-political dynamics around the world have led us to a stage where cyberattacks are being considered with the utmost of urgency and priority by governments. Israel has confirmed that they have responded to a cyber-attack with full military power. 

The Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives. The building was located in the Gaza Strip, which Israeli fighter jets have now destroyed.

This comes at a time when cyber warfare is gaining even more significance, and many countries are weighing in on multiple response mechanisms. Israel’s response to the cyber-attack on its virtual networks could in a way set a new benchmark for responding to digital warfare that could be designed to compromise the national security of any country. 

The closest any country has come to taking such a step earlier was back in 2015 when the US launched a drone strike against terror group ISIS after a cyber-attack leaked the personal details of US military personnel online. 

News18:         Calcalistech:        Forbes

You Might Also Read:

Mossad Needs Cyber Experts:
 

 

« Snowden Explains Why The CIA Is On Instagram
What Can We Do About Increasing Complexity In Cybersecurity? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.