Will Hezbollah Launch Cyber Attacks On Israel?

After the attack on Hezbollah personal devices in Lebanon, concerns are growing over the Islamic paramilitary group's potential for retaliatory cyber capabilities against Israel, widely seen as the likely perpetrator, though it remains silent over the incident.,

Hezbollah promised to retaliate against Israel after accusing it of detonating pagers and other radio devices across Lebanon on Tuesday 17th September, killing nine people and wounding nearly 3,000 others. 

The US State Department designated Hezbollah as a foreign terrorist organisation in 1997.

The explosions raised concerns across the region, demonstrating just how vulnerable modern societies have become with increased reliance on internet-connected devices. Details of the pager attack are yet to emerge, although reports suggest the devices were made by a shell company that embedded small, undetectable explosives inside. 

Hezbollah swiftly responded with a massive rocket barrage on northern Israel. However, the Iranian-backed group is also believed to have cyber capabilities that could be used in retaliation. Hezbollah is considered one of Israel’s most formidable enemies, with precision-guided missiles, well-trained troops, and cyber capabilities built over two decades. Experts say Hezbollah and Iran are also involved in global drug trafficking, using those funds to finance constant upgrades to their cyber capabilities. 

Cyber incidents have notably increased across the Middle East and according to Israel's National Cyber Directorate,  cyber-attacks shifted from data leaks and influence campaigns to causing disruption and damage. 
They identified 800 “significant incidents” between the start of the war and the end of 2023.

These incidents included attacks on critical infrastructure as well as individual targets, which have been attributed to Iranian threat groups

During this time, efforts were made to reduce vulnerabilities in hospital systems and control centres in the energy and water sectors, while also strengthening resilience in around 160 local authorities and supply chain entities.

In the early weeks of the war, Israel accused Iran and Hezbollah of attempting a cyberattack on a hospital in northern Israel. The attack was thwarted before it could disrupt hospital operations, but the National Cyber Directorate confirmed that “sensitive information” had been stolen from the hospital’s systems.

Neither side is immune to cyber attacks or operations like the pager attack in Lebanon, and both are racing to prevent attacks while targeting each other.

JPost   |   Economic Times   |    AlJazeera   |   Reuters   |   CBS 

Image: @SquadShia

You Might Also Read:

Israel-Hamas Conflict: The Escalation Of Cyberwarfare:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




 

« The Key Issues For SME Cyber Security 
British Railway Passengers Attacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Kennedys

Kennedys

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.