Will Hezbollah Launch Cyber Attacks On Israel?

After the attack on Hezbollah personal devices in Lebanon, concerns are growing over the Islamic paramilitary group's potential for retaliatory cyber capabilities against Israel, widely seen as the likely perpetrator, though it remains silent over the incident.,

Hezbollah promised to retaliate against Israel after accusing it of detonating pagers and other radio devices across Lebanon on Tuesday 17th September, killing nine people and wounding nearly 3,000 others. 

The US State Department designated Hezbollah as a foreign terrorist organisation in 1997.

The explosions raised concerns across the region, demonstrating just how vulnerable modern societies have become with increased reliance on internet-connected devices. Details of the pager attack are yet to emerge, although reports suggest the devices were made by a shell company that embedded small, undetectable explosives inside. 

Hezbollah swiftly responded with a massive rocket barrage on northern Israel. However, the Iranian-backed group is also believed to have cyber capabilities that could be used in retaliation. Hezbollah is considered one of Israel’s most formidable enemies, with precision-guided missiles, well-trained troops, and cyber capabilities built over two decades. Experts say Hezbollah and Iran are also involved in global drug trafficking, using those funds to finance constant upgrades to their cyber capabilities. 

Cyber incidents have notably increased across the Middle East and according to Israel's National Cyber Directorate,  cyber-attacks shifted from data leaks and influence campaigns to causing disruption and damage. 
They identified 800 “significant incidents” between the start of the war and the end of 2023.

These incidents included attacks on critical infrastructure as well as individual targets, which have been attributed to Iranian threat groups

During this time, efforts were made to reduce vulnerabilities in hospital systems and control centres in the energy and water sectors, while also strengthening resilience in around 160 local authorities and supply chain entities.

In the early weeks of the war, Israel accused Iran and Hezbollah of attempting a cyberattack on a hospital in northern Israel. The attack was thwarted before it could disrupt hospital operations, but the National Cyber Directorate confirmed that “sensitive information” had been stolen from the hospital’s systems.

Neither side is immune to cyber attacks or operations like the pager attack in Lebanon, and both are racing to prevent attacks while targeting each other.

JPost   |   Economic Times   |    AlJazeera   |   Reuters   |   CBS 

Image: @SquadShia

You Might Also Read:

Israel-Hamas Conflict: The Escalation Of Cyberwarfare:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




 

« The Key Issues For SME Cyber Security 
British Railway Passengers Attacked »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

Secure Enterprise Engineering (SEE)

Secure Enterprise Engineering (SEE)

SEE provides disruptive cybersecurity system engineering, architecture, and operational capabilities to make our customer’s missions execute faster, smarter, and more securely.