* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Sunday, July 27, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Top 5 entertainment news: Sandeep Reddy Vanga regrets trimming Animal’s runtime by 7-8 minutes, Akshay Ku – Times of India

    Top 5 Entertainment Highlights: Sandeep Reddy Vanga Reveals Why He Trimmed Animal’s Runtime by 7-8 Minutes, Plus Akshay Ku Updates

    Cote de Pablo reveals how Michael Weatherly used his soap opera roots to put her at ease in “NCIS” love scene – yahoo.com

    Cote de Pablo Reveals How Michael Weatherly’s Soap Opera Background Made Their “NCIS” Love Scene Easier

    City of Pelham announces entertainment district plans for former Oak Mountain Amphitheatre site – WVTM

    Pelham Unveils Exciting New Entertainment District Plans for Former Oak Mountain Amphitheatre Site

    Black Box Players presents ‘The Three Musketeers’ – CBS 19 News

    Experience the Adventure: Black Box Players Bring ‘The Three Musketeers’ to Life!

    AP Entertainment SummaryBrief at 1:51 p.m. EDT – Channel 3000

    Entertainment Highlights: Key Updates You Can’t Miss

    ‘Devil Wears Prada 2’ casts Anne Hathaway’s love interest replacing Adrian Grenier’s Nate – Entertainment Weekly

    Devil Wears Prada 2′ Casts New Love Interest for Anne Hathaway, Replacing Adrian Grenier’s Nate

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Eagle Unveils Revolutionary X-Ray Technology at Pack Expo

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Behind the Screens: The Impact of Technology on Real Estate – TRREB

    Behind the Screens: How Technology is Transforming the Future of Real Estate

    Sustainserv and Palau Announce Technology Partnership to Leverage Innovative AI Platform to Advance Sustainability Reporting – Business Wire

    Sustainserv and Palau Team Up to Transform Sustainability Reporting with Breakthrough AI Technology

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Top 5 entertainment news: Sandeep Reddy Vanga regrets trimming Animal’s runtime by 7-8 minutes, Akshay Ku – Times of India

    Top 5 Entertainment Highlights: Sandeep Reddy Vanga Reveals Why He Trimmed Animal’s Runtime by 7-8 Minutes, Plus Akshay Ku Updates

    Cote de Pablo reveals how Michael Weatherly used his soap opera roots to put her at ease in “NCIS” love scene – yahoo.com

    Cote de Pablo Reveals How Michael Weatherly’s Soap Opera Background Made Their “NCIS” Love Scene Easier

    City of Pelham announces entertainment district plans for former Oak Mountain Amphitheatre site – WVTM

    Pelham Unveils Exciting New Entertainment District Plans for Former Oak Mountain Amphitheatre Site

    Black Box Players presents ‘The Three Musketeers’ – CBS 19 News

    Experience the Adventure: Black Box Players Bring ‘The Three Musketeers’ to Life!

    AP Entertainment SummaryBrief at 1:51 p.m. EDT – Channel 3000

    Entertainment Highlights: Key Updates You Can’t Miss

    ‘Devil Wears Prada 2’ casts Anne Hathaway’s love interest replacing Adrian Grenier’s Nate – Entertainment Weekly

    Devil Wears Prada 2′ Casts New Love Interest for Anne Hathaway, Replacing Adrian Grenier’s Nate

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Eagle Unveils Revolutionary X-Ray Technology at Pack Expo

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Behind the Screens: The Impact of Technology on Real Estate – TRREB

    Behind the Screens: How Technology is Transforming the Future of Real Estate

    Sustainserv and Palau Announce Technology Partnership to Leverage Innovative AI Platform to Advance Sustainability Reporting – Business Wire

    Sustainserv and Palau Team Up to Transform Sustainability Reporting with Breakthrough AI Technology

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

What are the cyber risks from the latest Middle Eastern conflict?

October 18, 2023
in Technology
What are the cyber risks from the latest Middle Eastern conflict?
Share on FacebookShare on Twitter

The outbreak of war between Hamas and Israel in October 2023 has seen a wide variety of accompanying cyber attacks from hacktivists and other groups. We look at the risks to organisations

Alex Scroxton

By

Alex Scroxton,
Security Editor

Published: 18 Oct 2023 12:30

Open warfare returned to the Middle East in the early hours of Saturday 7 October, when Hamas operatives stormed the border between Israel and the Palestinian enclave of Gaza. In common with other modern kinetic conflicts, the developing conflict between Hamas and Israel has brought with it a corresponding and escalating online cyber war, raising the prospect of organisations around the world being caught up in cyber incidents arising from the conflict.

Meanwhile, organisations with links to the conflict, such as non-governmental organisations, defence contractors, government bodies, and even unrelated companies with branch offices in Israel, will be at heightened risk of targeted malicious activity from different threat actors, from hacktivists to nation state-backed advanced persistent threat (APT) groups.

With these thoughts in mind, we set out to examine what this new cyber war looks like, examine the patterns of threat activity that are being seen, and ask what steps security teams can take to ensure their resilience should they find their organisations a target.

Much of the observed activity to date has centred on hacktivist groups conducting website defacement or distributed denial of service (DDoS) attacks, and disinformation and misinformation campaigns online – such bot-driven campaigns have been running rampant on X (formerly Twitter) in recent months.

According to SecurityScorecard’s Strike Threat Intelligence team, the majority of malicious cyber activity to date has comprised actors physically apart from the conflict, and without known links to Hamas.

The international scope of this activity has been particularly of note, including hacktivist groups backing both sides – SecurityScorecard found evidence of hacktivists in countries such as India and Ukraine taking Israel’s side and attacking Palestinian targets, while Russian and Iran-linked groups tended to go for Israeli targets, alongside others countries including Bangladesh, Indonesia and Morocco.

Among the known groups to have involved themselves on Hamas’s side are the Russia-linked Killnet DDoS group and its affiliated Anonymous Sudan collective, which is neither related to Anonymous, nor Sudanese. Among targets they have hit have been Israeli government websites, the Shin Bet/Shabak security agency, and the Jerusalem Post newspaper.

Regardless of the target, the majority of these attacks have had little long-term disruptive impact – Israeli targets can appropriately defend themselves, and Palestinian ones are less numerous and operate less sophisticated systems.

There is also clear evidence that the direction in which the current cyber war in the Middle East seems to be unfolding is following a similar pattern to how the ongoing cyber war between pro-Russian and pro-Ukrainian actors began in the spring of 2022.

Indeed, Jeremiah Fowler of WebsitePlanet, who has been tracking both wars, said that he was seeing many of the same techniques in use now that were used against Russia by pro-Ukrainian hacktivists, including Ukraine’s so-called IT Army.

“However, they seem to be less effective now,” he said. “The one major factor that makes these cyber war tactics different is the time between conflicts.

“In the 19 months since hacktivists declared cyber war against Russia, cyber security experts and intelligence services around the world have had time to analyse, prepare and try to insulate themselves by learning from the failures of Russia’s cyber defences.

“After all, it’s a fact that cyber warfare will play a significant role in any current and future conflicts,” said Fowler. “Cyber space acts now as a second front with no defined rules of engagement. Hacktivists and government-affiliated groups can choose a side and launch numerous attacks based on their specific skill sets, tipping the scales of the conflict with seemingly just a few clicks.”

Hamas’ attention to OpSec

One substantial difference observed between the two conflicts is a lack of cyber activity before the initial Hamas attack. Prior to Russia’s invasion of Ukraine, which had been signalled months in advance by the Russian government, Ukraine was bombarded with a widespread campaign of cyber intrusions designed to soften up critical targets in advance.

This was not the case in the Gaza war, and this is not much of a surprise, because out of necessity, Hamas spent months – maybe years – plotting its initial attack with exceptional attention paid to operational security (OpSec). Indeed, it has been suggested that some senior members of Hamas were kept in the dark entirely, in case they were compromised by Israeli intelligence.

Therefore, for the incursion to take Israel by complete surprise, it may have been necessary for pro-Palestinian groups and Hamas-affiliated actors to confine their activity to normal levels. According to SecurityScorecard’s intel team, this was almost certainly the case.

“SecurityScorecard’s recently expanded collections of Hamas-affiliated messaging channels contain no evidence of how or when Hamas’s operation would begin prior to the start of the conflict,” said the Strike Threat Intelligence team.

“This suggests that, in contrast to other contemporary wars, the frequency or impact of cyber and information operations did not increase leading up to the war.

“A Russian hacktivist group may, for example, oppose Israel and be capable of attempting attacks against Israeli targets following the start of the war, but such a group would be unlikely to have a relationship with Hamas that could have offered it the early indications necessary to conduct cyber operations as a prelude to physical attacks,” the Strike team pointed out.

The isolation of Hamas and Israel’s clear technological superiority in this instance may also go some way to explaining why no cyber activity preceded the physical conflict.

Defensive posture

Given the most widespread form of impactful cyber attack seen to date has been DDoS attacks, defenders should consider implementing DDoS mitigations as a priority. Radware, a specialist supplier of DDoS mitigation services, suggests the following checklist as a strong basis for a defensive strategy:

Gather up-to-date intelligence on active threat actors that can be used to implement pre-emptive protection, for example, adding IP ranges associated with their activity to deny lists;
Implement behavioural-based detection to quickly and accurately spot and block traffic anomalies while allowing genuine traffic through;
Implement real-time signature creation to quickly guard against novel threats and zero-days;
Draw up a cyber security emergency response plan, making sure it accounts for DDoS attacks on connected systems and devices, and test it;
Add hybrid mixes of on-premise and cloud DDoS protection services to enable real-time attack prevention that can address higher-volume attacks, and protect from pipe saturation.

Operators of critical infrastructure may additionally wish to harden defences around their operational technology (OT), such industrial control systems (ICS). Security teams may wish to review whether or not it is really necessary to expose such devices to the public internet (spoiler, it is not), and if possible, restricting access to them by adding known or dependent IPs to an allow list, and placing them behind a virtual private network (VPN) or firewall.

Beyond hardening networks, defenders may wish to consider the possibility of other forms of attack. Chris Hauk, consumer privacy advocate at Pixel Privacy, said: “Organisations with Israeli connections will want to stay alert for cyber attacks that could come from both without and within. Organisations should educate their employees to the risks of phishing schemes to gain access to internal systems. It is also possible that some employees may be sympathetic to Hamas, possibly initiating attacks from within.”

In addition, financially motivated cyber criminals will also be looking to exploit the war to access target networks for data exfiltration or ransomware attacks, so it is important for both security teams and regular employees to be on the lookout for suspicious activity, as Paul Bischoff of Comparitech explained.

“UK organisations should be on the lookout for phishing attacks that use the Israel-Palestine conflict as clickbait,” said Bischoff. “Phishing emails, messages and phone calls attempt to trick victims into clicking on malicious links leading to fake login pages, or attachments that carry malware.

“The content of messages could be related to charities, misinformation about the conflict or even recruitment,” he said. “Never click on links or attachments in unsolicited messages, and always verify the sender’s identity before handing over money or private information.”

Shields up

A few days prior to the onset of the war in Ukraine, Jen Easterly of the US Cybersecurity and Infrastructure Security Agency issued her now famous “Shields Up” alert to encourage organisations to take steps to bolster their resilience in the face of what was coming.

In the event, the cyber impact of the war in Ukraine has been rather more limited than was feared, with little disruptive activity observed beyond the physical warzone – although Ukrainian targets faced an onslaught of cyber attacks themselves.

With a reasonable degree of confidence, we can speculate that the cyber element of the Hamas-Israel war will follow a similar trajectory.

All the same, as we have seen, for those organisations that may find themselves in some way adjacent to the fighting, or bear some connection to Israel or Palestine, should consider dusting off their incident response plans and raising their shields.

Read more on Hackers and cybercrime prevention


Hacktivist attacks against Israeli websites mirror attacks following Russian invasion of Ukraine

BillGoodwin

By: Bill Goodwin


Red Cross issues rules of engagement for hackers in conflicts

SebastianKlovig Skelton

By: Sebastian Klovig Skelton


NATO countries must coordinate their cyber forces to combat the Russian threat  


CyberUK 23: Ukraine offers masterclass in withstanding cyber war

AlexScroxton

By: Alex Scroxton

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : Computer Weekly – https://www.computerweekly.com/news/366555872/What-are-the-cyber-risks-from-the-latest-Middle-Eastern-conflict

Tags: Cyberriskstechnology
Previous Post

CMA sets initial scope of UK cloud market anti-trust probe into AWS and Microsoft

Next Post

BREAKING: Explosion at Gaza hospital, IDF claims Hamas misfire, Hamas blames Israel

Energy landscapes direct the movement preferences of elephants – besjournals

Energy landscapes direct the movement preferences of elephants – besjournals

July 27, 2025
At United Nations Summer Program, Computer Science Student Examines AI Ethics – Georgetown University

At United Nations Summer Program, Computer Science Student Examines AI Ethics – Georgetown University

July 27, 2025
Return of wolves to Yellowstone has led to a surge in aspen trees unseen for 80 years – Live Science

Wolves’ Return to Yellowstone Sparks Unprecedented Aspen Tree Boom After 80 Years

July 27, 2025
‘Bluey’ Is Growing Up: BBC Plots All-Ages Expansion For The Franchise As A Full-Fledged Lifestyle Brand – Cartoon Brew

‘Bluey’ Is Growing Up: BBC Plots All-Ages Expansion For The Franchise As A Full-Fledged Lifestyle Brand – Cartoon Brew

July 27, 2025
Katie Ledecky, Summer McIntosh and a race for the ages at World Swimming Championships – NBC Sports

Katie Ledecky and Summer McIntosh Ignite an Epic Showdown at the World Swimming Championships

July 27, 2025
5 ways Trump has shaped the economy in 6 months – The Hill

5 Game-Changing Ways Trump Transformed the Economy in Just 6 Months

July 27, 2025
Flutter Entertainment Announces Pricing Of $1.272 Bln Of Additional Senior Secured Notes Due 2031 – Nasdaq

Flutter Entertainment Raises $1.27 Billion in Major Senior Secured Notes Offering Due 2031

July 27, 2025
KFF Health Tracking Poll: Public Views on Recent Tax and Budget Legislation – KFF

How the Public Really Feels About the Latest Tax and Budget Changes

July 27, 2025
Dollar falls against yen as markets weigh new trade deal, Japanese politics – Reuters

Dollar falls against yen as markets weigh new trade deal, Japanese politics – Reuters

July 27, 2025
Clinch County Schools prepare for students’ return with new policies, technology – WALB

Clinch County Schools Prepare for Students’ Return with Exciting New Policies and Cutting-Edge Technology

July 27, 2025

Categories

Archives

July 2025
MTWTFSS
 123456
78910111213
14151617181920
21222324252627
28293031 
« Jun    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (741)
  • Economy (765)
  • Entertainment (21,645)
  • General (16,133)
  • Health (9,803)
  • Lifestyle (773)
  • News (22,149)
  • People (767)
  • Politics (774)
  • Science (15,980)
  • Sports (21,262)
  • Technology (15,746)
  • World (748)

Recent News

Energy landscapes direct the movement preferences of elephants – besjournals

Energy landscapes direct the movement preferences of elephants – besjournals

July 27, 2025
At United Nations Summer Program, Computer Science Student Examines AI Ethics – Georgetown University

At United Nations Summer Program, Computer Science Student Examines AI Ethics – Georgetown University

July 27, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version