Remote Pager Attack Begins A New Era Of Warfare

At least 32 people, including two children, were killed and thousands more injured, many seriously, after communication devices, used by the armed group Hezbollah, dramatically exploded across Lebanon. 

The explosions were precisely targeting the pagers of members of Hezbollah, an anti-Israel Military organisation controlled by the government of Iran.

The pagers were distributed by Hezbollah to its personnel as a secure communications device, following concerns over the security of mobile phones. A day later, Lebanon experienced more deadly blasts as walky-talky radios used by Hezbollah also detonated.

This likely Israeli-directed explosive pager attack on Lebanese terrorist group Hezbollah is something that would not have worked a few years ago.  

The details of how Israeli intelligence supposedly achieved the operation are not fully known. It’s not clear whether Israel's Mossad spy agency set up a dummy company to sell the pagers to Hezbollah, or intercepted consignments of pagers in transit to add the explosives using software capable of responding to a remote command. 

The British defence establishment has long recognised the threat. Indeed, Britain has successfully influenced other major European nations to adopt common security guidelines for domestic Internet-connected devices, such as doorbell cameras or routers. Today, modern data networks, such as those used in 4G or 5G mobile, are increasingly “software defined”, and fears of malicious software update patches were what convinced the UK to join the US in removing Chinese-designed and manufactured Huawei equipment  from its 5G  infrastructure.

The automotive sector has been acutely conscious of the security risks of Internet connected devices a for years, although so far there is no evidence that malicious actors are able to use this type of technology to turn e-bikes or mobile phones into weapons. 

Unherd  |   Gov.UK   |   CNN   |   CNN   |    BBC   |   Washington Post 

Image: Ideogram 

You Might Also Read: 

Smartphones Are More Vulnerable Than You Think:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 





 

« Six Steps On The Road To NIS2 Compliance
Data Centres Given Critical National Infrastructure Status In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.