Israel bombs to fight Gaza hackers

Israel is proud of its technological capability. It produces tons of scientific research, has been awarded the Nobel Prize and over the years, seems to have become a major player in cybersecurity worldwide, both because of its government activities and the growing private sector, which exports everything. from network security products to intrusion tools from companies like NSO Group and Cellebrite.

Gaza jpg

Earlier this year, Israel's technology capabilities made headlines when sabotaged (again) the nuclear of Iran. No one has confirmed exactly what happened, but an explosion halted uranium enrichment at Natanz, Iran, when centrifuges "broke down".

Israeli Prime Minister Benjamin Netanyahu has never confirmed that Israel was behind the , but greeted Mossad for a successful business. Of course, the company reminded many of the virus Stuxnet, which was used in 2010 to sabotage Iran's nuclear program again.

However, for Hamas fighters in Gaza, Israel's most "beloved" enemy, the Middle East cyber security superpower responds with conventional bombs, many of which are supplied by the United States. More than 200 people have been killed, according to the Gaza Ministry of Health. Some of these bombs, according to the Israeli Defense Forces, were used in retaliation against Palestinian cyber operations (!).

Last week, the Israeli air force wrote on Twitter that it had attacked a site where Hamas was storing "cyber equipment" in the northern strip of Gaza. On Wednesday, he wrote on Twitter that he had attacked three Hamas members in an apartment used for cyber operations.

"This attack is part of dozens of operations against Hamas' capabilities in cyberspace," the Israelis said.

He still paid her and the Associated Press and other international media outlets and according to the attackers the target was "electronic part of the Hamas military wing".

According to CNN, a senior Israeli Defense Ministry official said the building was used to research and develop high-level capabilities for sensitive cyber-attacks against Israel. Israel said the bombing of the building was "the only way" to overcome the threat. always according to CNN.

Even if we believe that every building that has been bombed by Israel in Gaza is a threat to Israel's security, where are the cyber-attacks by the imaginary Middle Eastern nation, which is secretly infiltrating Iran's carefully guarded nuclear facility?

Bombing one of the most populous parts of the world, which is under Israeli blockade and just an hour's drive from Tel Aviv, seems to be the only way for Israel to slow down its "cyber attacks". Hamas?

Israel just wanted to bomb the Palestinians with excuses. A cyber security analyst who has asked to remain anonymous because he is not authorized to speak to the press. Reported on the Motherboard.

"I just have a hard time believing that Israel thought that Hamas's cyber operations were threats that they could not deal with and that they had to drop bombs."

Daniel Moore, a cyber researcher and former PhD student at King's College London's War Studies Department, said:

"I guess Israel's shrinking target bank had some entries that were labeled as being used by Hamas for cyber activities, but the bombings are unlikely to reduce cyber operational efficiency. "Hamas has some potential, mainly in gathering intelligence, but I doubt that this plays an important role in Israel's overall aggressive policy."

It is a war, and the goal of any war is the ultimate annihilation of the adversary. So it seems that Israel is willing to drop bombs to kill and does not seek to use sophisticated attacks on the supply chain, since there is no bloodshed.
Even if it means demolishing media offices and killing children.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.
hacker, gaza

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).