Will Hezbollah Launch Cyber Attacks On Israel?

After the attack on Hezbollah personal devices in Lebanon, concerns are growing over the Islamic paramilitary group's potential for retaliatory cyber capabilities against Israel, widely seen as the likely perpetrator, though it remains silent over the incident.,

Hezbollah promised to retaliate against Israel after accusing it of detonating pagers and other radio devices across Lebanon on Tuesday 17th September, killing nine people and wounding nearly 3,000 others. 

The US State Department designated Hezbollah as a foreign terrorist organisation in 1997.

The explosions raised concerns across the region, demonstrating just how vulnerable modern societies have become with increased reliance on internet-connected devices. Details of the pager attack are yet to emerge, although reports suggest the devices were made by a shell company that embedded small, undetectable explosives inside. 

Hezbollah swiftly responded with a massive rocket barrage on northern Israel. However, the Iranian-backed group is also believed to have cyber capabilities that could be used in retaliation. Hezbollah is considered one of Israel’s most formidable enemies, with precision-guided missiles, well-trained troops, and cyber capabilities built over two decades. Experts say Hezbollah and Iran are also involved in global drug trafficking, using those funds to finance constant upgrades to their cyber capabilities. 

Cyber incidents have notably increased across the Middle East and according to Israel's National Cyber Directorate,  cyber-attacks shifted from data leaks and influence campaigns to causing disruption and damage. 
They identified 800 “significant incidents” between the start of the war and the end of 2023.

These incidents included attacks on critical infrastructure as well as individual targets, which have been attributed to Iranian threat groups

During this time, efforts were made to reduce vulnerabilities in hospital systems and control centres in the energy and water sectors, while also strengthening resilience in around 160 local authorities and supply chain entities.

In the early weeks of the war, Israel accused Iran and Hezbollah of attempting a cyberattack on a hospital in northern Israel. The attack was thwarted before it could disrupt hospital operations, but the National Cyber Directorate confirmed that “sensitive information” had been stolen from the hospital’s systems.

Neither side is immune to cyber attacks or operations like the pager attack in Lebanon, and both are racing to prevent attacks while targeting each other.

JPost   |   Economic Times   |    AlJazeera   |   Reuters   |   CBS 

Image: @SquadShia

You Might Also Read:

Israel-Hamas Conflict: The Escalation Of Cyberwarfare:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




 

« The Key Issues For SME Cyber Security 
British Railway Passengers Attacked »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC is a cyber security research and development and training centre

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.

London School of Emerging Technology (LSET)

London School of Emerging Technology (LSET)

LSET's Cyber Security Unit is your premier destination for comprehensive cybersecurity education and training.