Remote Pager Attack Begins A New Era Of Warfare

At least 32 people, including two children, were killed and thousands more injured, many seriously, after communication devices, used by the armed group Hezbollah, dramatically exploded across Lebanon. 

The explosions were precisely targeting the pagers of members of Hezbollah, an anti-Israel Military organisation controlled by the government of Iran.

The pagers were distributed by Hezbollah to its personnel as a secure communications device, following concerns over the security of mobile phones. A day later, Lebanon experienced more deadly blasts as walky-talky radios used by Hezbollah also detonated.

This likely Israeli-directed explosive pager attack on Lebanese terrorist group Hezbollah is something that would not have worked a few years ago.  

The details of how Israeli intelligence supposedly achieved the operation are not fully known. It’s not clear whether Israel's Mossad spy agency set up a dummy company to sell the pagers to Hezbollah, or intercepted consignments of pagers in transit to add the explosives using software capable of responding to a remote command. 

The British defence establishment has long recognised the threat. Indeed, Britain has successfully influenced other major European nations to adopt common security guidelines for domestic Internet-connected devices, such as doorbell cameras or routers. Today, modern data networks, such as those used in 4G or 5G mobile, are increasingly “software defined”, and fears of malicious software update patches were what convinced the UK to join the US in removing Chinese-designed and manufactured Huawei equipment  from its 5G  infrastructure.

The automotive sector has been acutely conscious of the security risks of Internet connected devices a for years, although so far there is no evidence that malicious actors are able to use this type of technology to turn e-bikes or mobile phones into weapons. 

Unherd  |   Gov.UK   |   CNN   |   CNN   |    BBC   |   Washington Post 

Image: Ideogram 

You Might Also Read: 

Smartphones Are More Vulnerable Than You Think:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 





 

« Six Steps On The Road To NIS2 Compliance
Data Centres Given Critical National Infrastructure Status In Britain »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.

Open Cybersecurity Alliance (OCA)

Open Cybersecurity Alliance (OCA)

OCA is building an open ecosystems where cybersecurity products interoperate without the need for customized integrations. We're making standards-based interoperable cybersecurity a reality.