Feeds

Israeli deputy PM's social media hacked by pro-Palestine group

Cyber attacks continue in wake of Gaza bombardment

The Power of One eBook: Top reasons to choose HP BladeSystem

Israel's deputy prime minister Silvan Shalom has become the latest victim of the escalating cyber conflict between Israel and Palestine after his social media accounts were hacked and used to issue pro-Palestine propaganda.

Shalom’s Facebook, Twitter, YouTube, Blogger and LinkedIn accounts were hacked by a pro-Palestine group known as ZCompany Hacking Crew (ZHC), The Times of India reported.

The group is said to have posted videos on Shalom's YouTube account depicting alleged Israeli atrocities against Palestine, while typical tweets included: "Get out of Palestine > Israeli Zionists! Stop the attacks! End the slaughter of innocent people!!”

Although the social media accounts have now been reclaimed or taken offline, the hackers threatened to release private documents, contacts and even personal photos they claimed to have obtained by cracking Shalom's Gmail and Picasa account.

The attacks are the latest in a continuing online theatre of conflict which sparked into life after Israeli forces launched Operation Pillar of Defense – pounding Gaza for over a week in what it claimed was a bid to target terror groups in the region that had been firing rockets at civilian targets within Israel.

Pro-Palestine hacktivists, including Anonymous, have sought to hit back, launching an estimated 100 million DDoS and web defacement attacks on Israeli web sites, according to Israeli newspaper Haaretz.

"In the first two days of the operation, we saw as many attempts to hack government websites as we usually see in a full month," acting head of E-Government, Ofir Ben Avi, told the paper.

"The number of denial-of-service attacks is like nothing we've ever seen before."

The Bank of Jerusalem’s online services were apparently taken out for a few hours, as was the Israel Defense Force’s blog, and hundreds of privately-owned Israeli web sites were defaced with pro-Hamas and Palestine messages.

However, for the most part Israel’s tech defences appear to have held firm, which one would expect from a country which allegedly had a hand in the development of the infamous Stuxnet and Flame malware.

Israel also had the upper hand in that Gaza’s internet and telecommunications networks run in and out of the country, giving Jerusalem the option of choking traffic in the region if it chooses to do so. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.