Feeds

Anonymous blitzes Israel in new attack

OpIsrael rocked, says Anon. Nothing to see here, says Israel

SANS - Survey on application security programs

Anonymous claims to have disrupted more than 100,000 Israeli web sites and caused over $US3bn in damages with a new campaign, called OpIsrael, launched over the weekend. Israeli officials say the effort was largely unsuccessful in breaching the nation's online defences.

In a typically understated piece of pre-op PR last Thursday, an Anonymous press release revealed the attack would take place on Sunday – which happens to be Holocaust Remembrance Day – in retaliation for recent Israeli air strikes in Gaza and treatment of Palestinians in the region.

Anonymous' release added the following:

To the government of Israel: You have NOT stopped your endless human right violations. You have NOT stopped illegal settlements. You have NOT respected the ceasefire. You have shown that you do NOT respect international law. This is why that on April 7, elite cyber-squadrons from around the world have decided to unite in solidarity with the Palestinian people against Israel as one entity to disrupt and erase Israel from cyberspace.

A tweet from the OpIsrael account on Sunday claimed that 100,000 web sites, 40,000 Facebook pages, 5,000 Twitter accounts and 30,000 Israeli bank accounts were hacked, causing $3bn worth of damages.

At the time of writing, the web sites of the Prime Minister's Office, the Central Bureau of Statistics, Mossad and the President of Israel, among others, were unavailable.

The Hacker News has a list of pastebin pages revealing all the sites apparently targeted. Some were defaced with anti-Israel slogans while hundreds of others suffered sustained DDoS attack, it claimed.

Private firms were also affected, with the Twitter account of AVG_Israel compromised by attackers in an embarrassing turn of events for the security vendor.

In response, Israeli officials have been typically defiant, playing down the extent and damage caused by the attacks.

Yitzhak Ben Yisrael, of the National Cyber Bureau, told The Indy that there is “hardly any real damage”, claiming that “Anonymous doesn't have the skills to damage the country's vital infrastructure”.

In addition, a Finance Ministry statement sent to New York Times claimed that although government sites were under DDoS attack they haven’t been greatly affected.

However, website for Israel's Finance Ministry and Foreign Affairs Ministry sites remain down at the time of writing.

As such, the current OpIsrael blitz seems to be more successful than the last time Anonymous tried something like this, back in November 2012.

Things haven’t been going all the way of Anonymous, though, with reports emerging that Jordanian security forces have arrested some of the suspected hackers.

The opisrael.com site also appears to have been hacked and defaced by pro-Israel hacktivist EhIsR. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.