Hamas-Israel conflict enters cyber space as hacker groups target government and private digital assets: Report

The Hamas-Israel conflict entered cyberspace with hacker groups targeting government and private digital assets

October 10, 2023 04:48 pm | Updated 04:48 pm IST

The Hamas- Israel conflict entered cyberspace with hacker groups supporting either side launching cyber-attacks with an aim to sow confusion or alarm.

The Hamas- Israel conflict entered cyberspace with hacker groups supporting either side launching cyber-attacks with an aim to sow confusion or alarm. | Photo Credit: Reuters

The Hamas- Israel conflict entered cyberspace with hacker groups supporting either side launching cyber-attacks with an aim to sow confusion or alarm.

Pro-Hamas hacking groups launched dozens of DDoS attacks against government and private websites in Israel, knocking them offline. The attacks did not have a lasting impact.

Attacks included the targeting of an Israeli app that warns residents of incoming rocket strikes, attacks against the Jerusalem Post and Denial-of-Service attacks against governement websites, a report from The Washington Post said.

Pro-Israeli hacktivists meanwhile were also active, with the official Hamas website being taken down by a hacker group called India Cyber Force, a report from Cybernews said.

(For top technology news of the day, subscribe to our tech newsletter Today’s Cache)

Hacker groups like Killnet have also taken to Telegram to take responsibility for the attack on the website gov.il.

Anonymous Sudan, another hacktivist group widely suspected to be Russian, also sided with Hamas and Killnet on Telegram and claimed responsibility for attacks on The Jerusalem Post. The group also claimed responsibility for targeting Israel’s Iron Dome, the country’s mobile all-weather air defense system, and alert applications in Israel.

Another group that Microsoft calls Storm-1133 from Gaza Strip, in preparation for the war was found to have targeted energy, defence and telecommunications companies inside Israel early in the year.

The group was found to have used fake LinkedIn profiles and posed as software developers or project managers to send malware to employees to install back doors for later communication, Microsoft said in a report.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.