Earlier this month, pro-Palestine supporters of Anonymous launched “OpIsrael”, a virtual offensive against Israel in protest of Israel’s strikes inside of Gaza. The campaign has been linked to nearly a thousand website defacements, and numerous DDoS attacks, forcing Israel to fight a two front war.
Last week, Israel admitted that it has been targeted in a mass campaign with millions of attempts to hack state websites.
“This is an unprecedented attack,” Finance Minister Yuval Steinitz said at the time, indicating that Israel had “deflected 44 million cyber attacks on government websites.”
The latest target of OpIsrael is the DEBKA news agency, for their alleged ties to Mossad.
The attack against DEBKA resulted in the exposure of alleged subscriber information, but so far only a handful of passwords and email address have been leaked to the Web by OpIsrael supporters.
“DEBKA.com is an Israeli-Based News-Agency, which has tied relations with Israeli Intelligence Agency (MOSSAD) and Military sources… DEBKA first started around 2000 in purpose of polluting media with Zionist-Oriented news and rumors,” a statement from OpIsrael says.
“Using these methods the agency has got the ability to release news and rumors in subjects which have most impact in the eyes of readers and political figures. We have managed to hack their systems and acquire highly sensitive information, including employees and authors personal information, labs details and of course their subscribers.”
DEBKA hasn’t issued any statement on the attack or loss of data. On Wednesday, the site was functioning as normal. The attack marks one of the few times that Anonymous has singled out a press agency, but it’s a move that many supporting OpIsrael approved of – given that DEBKA isn’t viewed as a legit news organization.
Anonymous isn’t the only group hunting Israel online. Earlier this week, a group with an Iranian-sounding name that translates into the word swallow in Farsi, Parastoo, attacked the UN’s nuclear watchdog, The International Atomic Energy Agency (IAEA). The IAEA is investigating Iran’s nuclear program, and they confirmed that the attack resulted in the loss of contact data from an old server.
The group posted some of the data taken from the server, and encouraged those listed to sign a petition “demanding an open IAEA investigation into activities at Dimona [where]…Israel owns a practical nuclear arsenal, tied to a growing military body.”
Dimona, a southern desert town, is the location of a nuclear research center maintained by Israel. However, IAEA inspectors are not allowed to go near the plant. According to an agreement Israel reached with the U.S., only American inspectors can go to the plant, and only if notice is given in advance.
The IAEA is still investigating the incident.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- Blumira Raises $15 Million for SMB-Tailored XDR Platform
- Microsoft Will Pay $20M to Settle US Charges of Illegally Collecting Children’s Data
- KeePass Update Patches Vulnerability Exposing Master Password
