web analytics
September 3, 2014 / 8 Elul, 5774
At a Glance

Posts Tagged ‘hackers’

No, #Dimona Nuke Plant NOT Leaking

Friday, July 4th, 2014

The IDF Spokeperson’s twitter account was hacked last night.

The following message was sent out to their 252,000 Twitter followers:

IDF @IDFSpokesperson 03/07/14 23:15 #WARNING: Possible nuclear leak in the region after 2 rockets hit Dimona nuclear facility

Once the IDF spokesperson’s office realized they’d been hacked, they blocked it and sent out the following statement:

IDF @IDFSpokesperson We apologize for the incorrect tweets Our twitter account was compromised. We will combat terror on all fronts including the cyber dimension

So don’t worry. Hamas terrorists haven’t hit Dimona, yet, but not necessarily for lack of trying.

Their blog is currently down too (8:00 AM), hopefully just for upgrading its security.

We hope that the IDF Cyber Unit has a little chat with the IDF Spokesperson’s office about Internet security.

Pro-Palestinian Hackers Commandeer Google Palestine Web Page

Wednesday, August 28th, 2013

Pro-Palestinian hackers calling for changing Israel to Palestine on Google Maps hacked the Google “Palestine” Web page.

The hackers on Monday diverted traffic from google.ps and redirected users to a hacked version of Google’s homepage.

“uncle google we say hi from Palestine to remember you that the country in google map not called israel. Its called Palestine,” the hacked page read.

The hackers also said on the page that changing “Isreal” on Google Maps to “Palestine” would be “revolution.” They said to listen to singer Rihanna and “be cool.”

“For a short period, some users visiting google.ps were redirected to a different website,” Google said in a statement Monday. “Google services for the google.ps domain were not hacked. We’ve been in contact with the organization responsible for managing this domain name and the issue should be resolved.”

The google.ps domain reportedly was down for several hours on Tuesday.

Google changed its regional search page from “Palestinian Territories” to “Palestine” in May, six months after the United Nations granted “Palestine” the status of “non-member observer state.”

The change angered Israeli officials, who said the designation prejudged the outcome of the then-stalled peace talks.

Palestinian Hacker Posts on Marc Zuckerberg’s Facebook Wall

Tuesday, August 20th, 2013

A Palestinian hacker posted a message on Facebook founder Marc Zuckerberg’s wall to show there is a bug in the social network’s security settings.

Khalil Shreateh of Hebron posted information about the bug on Zuckerberg’s wall late last week, following unsuccessful attempts to report the bug to Facebook security. The bug allowed Shreateh to post on the walls of other members despite security settings.

“Sorry for breaking your privacy … I had no other choice … after all the reports I sent to Facebook team,” Shreateh wrote on Zuckerberg’s wall.

Facebook security had denied that the flaw was a bug.

Shreateh, who is unemployed, had hoped to win a $500 reward paid out to hackers who discover bugs on Facebook. Instead, his Facebook account was frozen, since he violated Facebook’s terms of service by posting illegally on Zuckerberg’s page. His account has since been reinstated.

Zuckerberg has 18 million friends on his Facebook page.

IDF to Protect Smartphones from Hi-Tech Spies

Monday, April 15th, 2013

The IDF soon will install protective systems onboard its smartphones used by the IDF to protect them against digital Trojan horses and prevent various spyware software using the devices eavesdropping, Israel Defense reported.

The military’s Information Security department has determined there has been a significant rise in risks to the sensitive data found on cell phones of IDF officers who have yet to receive considerable protection.

Viruses take over the cell phones, via SMS messages, and allow hostile entities to know its location, view the contents of the device and even remotely operate its camera.

#OPIsrael Cyberattack: Hackers Mostly #Fail

Sunday, April 7th, 2013

The Hackers group Anonymous on Saturday night tried to make good on their threats and began to knock down a large number of Israeli websites, including government offices – for a few minutes at least. But mostly it’s more bluster than success.

Anonymous, in collaboration with pro-Palestinian cyber-terrorists initiated an attack on government sites and large organizations in Israel as “revenge” for Israel’s role in the Palestinian conflict, but really its about their Antisemitism.

Among other websites, they knocked down for a brief period of time include the Ministry of Defense’s, and the Ministry of Education’s, the Israeli EPA’s, military-industry’s, and the Central Bureau of Statistics’ websites.

They also took down the Israeli Cancer Association’s website and dozens of small Israeli sites. At some of the sites the hackers left pro-Palestinian messages and loud music.

The El Al website was downed as well, and that is one of the few that actually took a long time to go back online.

Access to some websites have slowed down, presumably due to the massive attacks, but they did not collapse.

Most of the sites returned to full activity after several minutes, a couple after several hours.

In fact, many of the sites the hackers are claiming via Twitter, that they’ve taken down, are actually working fine. Israel has been employing a number of tricks that have kept the cyber attacks at bay.

The Anti-Jewish Hacktivists are also publicizing what they claim are login passwords for various sites.

So far it appears that #OpIsrael is more bluster than success.

 

Israel’s security apparatus was prepared to face the cyber attack took place. There is concern among security experts that the attack, which began Saturday night, will encourage hackers and terrorist organizations around the world to join the “Anonymous” efforts, making it difficult for Israel’s security systems to withstand the pressure.

According to instructions given employees in the Defense Ministry and other outfits, work today might be disrupted in various computerized systems, and there may be some cessation of operations, in order to perform evaluations of incoming attacks.

A senior security official said in a closed forum a few days ago, that intelligence has been gathered against hackers and other entities that may participate in the attack. On Sunday there will be an assessments of the attack, to optimize the defenses and minimize the damage that may disrupt the systems’ activities.

 

On the other side of the fence, WhiteHat Israeli hackers have taken down or hacked a number of anti-Israeli sites in retaliation, including the OpIsrael website where they added facts about Israel and had the site play Hatikvah.

#ZionistHackers Defeating #OpIsrael

Sunday, April 7th, 2013

Last week ago I wrote about #OpIsrael the “planned new cyber attack against Israel”. My article ended by noting that “there will be plenty of Israeli geeks looking forward to the challenge – and quite capable of coming out on top”. I also tweeted my article to one of the Iranian backed anti-Israel hacker groups I mentioned and to one of the Anonymous news services. #OpIsrael was tagged as well. So to the anti-Israel hackers, don’t say I didn’t warn you that #OpIsrael was a really bad idea.

Sure enough, as #OpIsrael got underway, the official #OpIsrael site, www.opisrael.com, was hacked and is now playing Hatikvah.

The page was hacked by EhIsR and also contains a 20 point list of arguments in support of Israel (see below). Unlike the simple defacements that have typically targeted Israeli sites, this hack claims to have also destroyed all the data on the targeted server. This makes it a more serious attack, but in EhIsR’s defense  this was effectively an attack on an enemy infrastructure in a war like situation where as the attacks on NGOs and civilian infrastructure are more akin to targeting civilians.

EhIsR is not the only pro-Israel hacker, let’s call them Zionist Hackers, having a field day today. Not all are taking such an ethical approach to choosing their targets.

On the Israeli side as well, some hackers are going after soft targets or sites that for humanitarian reasons should be left out of any online war. As part of the pro-Israel response sites like the Palestinian Authority’s Medical Service website and a commercial site in Egypt have been hacked. A group called ‘Israel Elite Force’ claim to have taken down a range of sites in Pakistan. There are no doubt many more, and the day is still young.

While the Israeli hackers clearly have the technical skills that match or surpass those targeting Israel, the public diplomacy skills are still somewhat lacking.

A 20 point list of reasoned arguments shared in a defacement of a site that will be visited by those seeking to attack Israel, is not likely to convince anyone. Anti-Israel defacements typically use images, often fake or from different conflicts entirely, that display blood, guts, and gore and claim Israel is responsible for it. In other words, they use not just a technical means of sharing a message, but also demonization of Israel and a strong dose of victim-hood to spread their message.

The Zionist hackers like EhIsR are responding not with hate but with reason. It’s a shame that for most of the world such an approach is unlikely to be effective.

A better approach may have been to set off code red sirens and pictures of school children rushing for cover. More effective still, ethically more questionable, would have been a focus on the impact of terrorism. Israel avoids the publication of highly graphic images showing the aftermath of violence. An effort is made to get on with life. Perhaps not sharing this side of the conflict is a mistake. It promotes Israel’s toughness and resilience, but in the international community that simply makes Israel a legitimate target for further abuse.

The message that these Zionist hackers are ultimate projecting is the same message Israel has always gives in conventional warfare. The message says, “we’re tougher than you think, and attacking us is a really bad idea”. It may help security, but more is needed to win hearts and minds. For now though, I’m sure they’re celebrating their success… or at least they will be when they are finally done.

Here are EhIsR arguments:

1. Israel became a nation in 1312 BCE, two thousand years before the rise of Islam.

2. Arab refugees in Israel began identifying themselves as part of a Palestinian people in 1967, two decades after the establishment of the modern State of Israel.

3. Since the Jewish conquest in 1272 BCE, the Jews have had dominion over the land for one thousand years with a continuous presence in the land for the past 3,300 years.

4. The only Arab dominion since the conquest in 635 CE lasted no more than 22 years.

5. For over 3,300 years, Jerusalem has been the Jewish capital Jerusalem has never been the capital of any Arab or Muslim entity. Even when the Jordanians occupied Jerusalem, they never sought to make it their capital, and Arab leaders did not come to visit.

International Hackers to Target Israel on April 7

Wednesday, April 3rd, 2013

The first news of a planned new cyber attack against Israel , scheduled for April 7, 2013, was announced back on March the 11th, almost a full month earlier. The attack is a face saving effort to renew a campaign from last November, which was nothing less than a miserable failure. The previous campaign saw more than 44 million attacks by Anonymous on Israeli government servers, yet in the end only one server was noticeably impacted, and it just went a little wobbly under the increased load.

Given their past failure, a bit more can be expected from the new attack. The Times of Israel reports that the 100 largest websites in the country, including banks, credit card companies, and communications firms, are said to be targeted. This, of course, is nothing new. These days they are all routinely targeted. My own analysis uncovered a list of more than 1,350 specific targets, including research organizations like NGO-Monitor, human rights organizations like the Association for Civil Rights in Israel and even the Histadrut trades union. The list also includes the Prime Minister’s Office, Finance Ministry, Foreign Ministry, the Judiciary, Health Ministry, Trade Ministry, and the Knesset. In addition to 110 government servers, the list includes 318 academic servers, 582 company websites, and 448 organizations.

Given past experience, the government servers and most of the companies and academic servers would likely stand up to even a severe distributed denial-of-service attack. Such “actions” are becoming almost routine. The real impact will likely be felt by human rights organizations and civil society organizations that rely on cheap, shared hosting and will likely go off line temporarily if they come under attack. The more serious risk, however, comes from the real hackers, rather than these script kiddies. The new attack has a number of named hacker and groups with past reputations listed as supporting it. In fact, this new attack seems to be bringing together more groups than ever before.

More than a year ago, I warned that Iran was impersonating Anonymous in an effort to turn it on Israel. Evidence from Facebook show that a number of specific hacking groups behind the April 7th threat are Iranian backed and some are thought to have Iranian state sponsorship. These groups include the Iranian Cyber Army, Remember Emad (a joint project in Lebanon, with state backing) and Parastoo (which reportedly has ties to IRGC-QF and Hezbollah ). In the case of Parastoo, direct mention is made of psychological warfare and of efforts to advertise the attack in advance with the aim of spreading chaos and pushing Israeli actors into taking preventative action that causes further disruption. Given the timing of this new attack, and questions over what Obama and Netanyahu agreed on during the recent Presidential visit, one has to wonder at the timing of this new attack.

Last year, the FBI arrested several hackers from Anonymous. FBI Director Robert S. Mueller III warned at the time that “we should not forget that you want to identify these individuals who are responsible for these crimes, investigate them, prosecute them and put them in jail for a substantial period of time.” He also warned of the use of hackers by terrorists. The U.S. Government would no doubt be very interested in any identification data linked to Anonymous hackers that Israeli authorities are willing to provide.

There will be plenty of Israeli geeks looking forward to the challenge – and quite capable of coming out on top.

Printed from: http://www.jewishpress.com/news/breaking-news/international-hackers-to-target-israel-on-april-7/2013/04/03/

Scan this QR code to visit this page online: