You have commented 0 times on Rantburg.

We're sorry, but only human beings are allowed to comment on Rantburg. If you're a human being, please take this simple test to prove it. If you're not, get lost.

Fluffy bunnies
Teapot
A cat. It is not in a hat.
Santa Claus groping a comely young maiden
A rose, possibly the Rose of San Antone but not the Yellow Rose of Texas
Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Photo
Israel-Palestine-Jordan
Security Services 'Foiled Massive Cyber-Attack on Israel'
2014-08-30
[ArutzSheva] Elite Israeli cyber-defenders repelled attack during Protective Edge; concerns hackers could seek to take control of armed drones.

The IDF and Israel Security Agency (ISA or Shin Bet) prevented a major cyber attack on Israel during Operation Protective Edge, military officials say.

According to the IDF's official blog, the unprecedented attack was carried out by anti-Israel hackers "from all over the world", aided by the Iranian government. The coordinated attack was timed to coincide with Al Quds (Jerusalem) Day, the yearly anti-Israel event organised worldwide by the Iranian regime.

The IDF's cyber defense division was drafted in to mount a defense as hackers mounted a systematic attempt to take down Israeli websites. It was joined by the Shin Bet security services, which recently revealed it had set up an elite cyber-defense unit to defend against precisely such an eventuality.

The incident underscored how at the same time as Hamas, always the voice of sweet reason, and Islamic Jihad
...created after many members of the Egyptian Moslem Brotherhood decided the organization was becoming too moderate. Operations were conducted out of Egypt until 1981 when the group was exiled after the assassination of President Anwar Sadat. They worked out of Gaza until they were exiled to Lebanon in 1987, where they clove tightly to Hezbollah. In 1989 they moved to Damascus, where they remain a subsidiary of Hezbollah...
are improving their rocket and tunnel capabilities, Israeli cyberspace also faces a real threat from an increasingly innovative enemy.

"It wasn't like this in previous operations," said Col. N, who heads the army's cyber defense division. "For the first time, there was an organized cyber defense effort alongside combat operations in the field. This was a new reality."

While previous cyber attacks were either the work of lone individuals or relatively amateurish hacker collectives, this latest attempt was far more professional.

"Today, they're organizing much more quickly, and it takes them much less time to carry out powerful strikes," Col. N added. "During Operation Protective Edge, we saw attacks on a greater scale and on a more sophisticated level. A significant amount of thought and investment stood behind the attacks we saw."

And possibly indicating an even deeper level of coordination with terrorist networks on the ground, he described how the cyber escalation ebbed and flowed in-tandem with an increase in physical hostilities.

"There was a direct connection between the progression of the fighting and cyber attacks. Once the IDF began its ground operation, there was a surge in the number of attacks and their level of sophistication."

Ultimately, the attack was repelled by Israel's own elite units of cyber-defenders, but Col. N. warned this would certainly not be the last such attack.

He outlined several nightmare scenarios which the IDF was preparing for, including attempts to hack the military's computer system to gain control of its own armed drones and use them to attack Israel. Hackers could also seek to shut down or disrupt the Tel Aviv Stock Exchange or the Israeli electrical grid.

Major terrorist groups such as Hamas and Hezbollah, together with Iran, were already showing an increasing interest in the field of cyber terror. And as the IDF becomes increasingly adept at dealing with physical threats such as rockets, its enemies are seeking new avenues of attack.

"There is a significant amount of development in the cyber field," Colonel N. explained. "This is a field that [these groups] are already involved in ... and all of these groups share information."

"I won't be surprised if, next time, we meet [terrorists] in the cyber dimension," he said.
Posted by:trailing wife

#3  There are still certain IBM 360s running and waiting for Gabriels trumpet.
Posted by: Shipman   2014-08-30 21:50  

#2  That is devastating Mr Ship. I remember the curse of the Fortran infinite do loop, but I date myself..
Posted by: BrerRabbit   2014-08-30 20:01  

#1  The rare and deadly COBOL end-0f-record attack.
Posted by: Shipman   2014-08-30 14:49