The back and forth between Israel and a group of Saudi hackers escalated Monday as attacks and threats continue to mount.
According to reports, an attack on the Website for the Tel Aviv Stock Exchange slowed the site to a crawl but did not affect trading. In addition, El Al Israel Airlines took down its Website Monday after hacker 0xOmar, who has been linked to the Saudi hacking crew group-xp, warned that both it and the exchange site would be targeted by allied pro-Palestinian hackers, an anonymous source told the Associated Press.
The El Al site is now up and appears to be functioning properly.
The situation is the latest twist in an attack campaign that began earlier this month when hackers claiming to be part of a known Saudi hacking crew known as group-xp claimed to have compromised 400,000 Israeli credit card accounts and posted some online. Israeli initially authorities counted 15,000 accounts exposed, but upped that number to 6,000 after the hackers made a second release later in the week.
The attacks and the subsequent taunting by 0xOmar – who posted the credit card details online – led Israeli Deputy Foreign Minister Danny Ayalon described as being akin to a “terrorist operation” and pledge that the hackers would be tracked down. An Israeli blogger soon claimed to have traced 0xOmar to Mexico, but the hacker denied he had been identified.
The situation escalated further last week when an Israeli hacker identifying himself as a soldier in an Israeli intelligence unit reportedly posted information online about hundreds of Saudis, Egyptians, Syrians and others in an apparent retaliation.
So far, there have been no confirmed reports of sensitive Israeli government sites being hacked.
“Right now, we’re not seeing anything that’s especially interesting or especially dangerous,” Gadi Evron, former head of Internet security for the Israeli government, told the Associated Press.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
