Feeds

Israeli deputy PM's social media hacked by pro-Palestine group

Cyber attacks continue in wake of Gaza bombardment

SANS - Survey on application security programs

Israel's deputy prime minister Silvan Shalom has become the latest victim of the escalating cyber conflict between Israel and Palestine after his social media accounts were hacked and used to issue pro-Palestine propaganda.

Shalom’s Facebook, Twitter, YouTube, Blogger and LinkedIn accounts were hacked by a pro-Palestine group known as ZCompany Hacking Crew (ZHC), The Times of India reported.

The group is said to have posted videos on Shalom's YouTube account depicting alleged Israeli atrocities against Palestine, while typical tweets included: "Get out of Palestine > Israeli Zionists! Stop the attacks! End the slaughter of innocent people!!”

Although the social media accounts have now been reclaimed or taken offline, the hackers threatened to release private documents, contacts and even personal photos they claimed to have obtained by cracking Shalom's Gmail and Picasa account.

The attacks are the latest in a continuing online theatre of conflict which sparked into life after Israeli forces launched Operation Pillar of Defense – pounding Gaza for over a week in what it claimed was a bid to target terror groups in the region that had been firing rockets at civilian targets within Israel.

Pro-Palestine hacktivists, including Anonymous, have sought to hit back, launching an estimated 100 million DDoS and web defacement attacks on Israeli web sites, according to Israeli newspaper Haaretz.

"In the first two days of the operation, we saw as many attempts to hack government websites as we usually see in a full month," acting head of E-Government, Ofir Ben Avi, told the paper.

"The number of denial-of-service attacks is like nothing we've ever seen before."

The Bank of Jerusalem’s online services were apparently taken out for a few hours, as was the Israel Defense Force’s blog, and hundreds of privately-owned Israeli web sites were defaced with pro-Hamas and Palestine messages.

However, for the most part Israel’s tech defences appear to have held firm, which one would expect from a country which allegedly had a hand in the development of the infamous Stuxnet and Flame malware.

Israel also had the upper hand in that Gaza’s internet and telecommunications networks run in and out of the country, giving Jerusalem the option of choking traffic in the region if it chooses to do so. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.