Thursday, March 30th | 3 Nisan 5777

Close

Be in the know!

Get our exclusive daily news briefing.

Subscribe
April 3, 2016 9:55 pm

Israel Prepares for Cyberattack Aimed to ‘Punish Zionist Entity’ for ‘Crimes Against Humanity’

avatar by Ruthie Blum

Email a copy of "Israel Prepares for Cyberattack Aimed to ‘Punish Zionist Entity’ for ‘Crimes Against Humanity’" to a friend

A hacker [Illustrative]. Photo: Wikimedia Commons.

A hacker [Illustrative]. Photo: Wikimedia Commons.

Ahead of what has become an annual cyberattack against Israel by pro-Palestinian hackers, video clips have been circulating in various languages warning about Thursday’s imminent disruption of networks identified as being associated with the Jewish state, the Hebrew news site Walla reported on Sunday.

According to the report, on April 7 – the day designated by the hacker collective calling itself “Anonymous” for a yearly demonstration of support for the “Palestinian cause” – there will be an online assault on Israeli targets. Though such attacks have not caused significant damage in previous years, Walla said, this is not reason for Israelis to remain apathetic or complacent.

In the videos, which have been circulating for more than a month in English, Arabic, French and German, the group’s members are threatening Israel with the cyberattack “to punish the Zionist entity for continuing its murderous assaults and crimes against humanity that it commits against the Palestinian people.” The clips also call on the world to join the planned cyberattack, “and to unite in solidarity with the Palestinians against Israel.”

Related coverage

March 29, 2017 2:50 pm
0

Israel Defense Exports Reach $2.6 Billion, New Data Reveals

Israel’s military exports increased last year by 14%, according to data released Wednesday by the head of the relevant Defense...

“Based on experience from previous years, these cyberattacks take many forms, such as Distributed Denial of Service (DDoS), website defacement and, of course, phishing attacks,” said Eyal Benisti, CEO of IronScales and an expert in cyber and phishing attacks. “Over the past few months, we have witnessed a significant increase in Ransomware attacks, whose aim is to encrypt files and information on the victim’s computer and then demand ransom in exchange for their release. We anticipate an additional increase of these kinds of attacks on [April 7].”

The operations center of the Israeli cyber-security company Radware, which is tracking the upcoming attack, identified new tools distributed online ahead of the day in question, according to Walla, as well as tutorial videos on how to use them. Shira Sagiv, Radware’s Director of Security Product Marketing told Walla: “These include new tools that were developed especially for the attack on Israel, and improved and upgraded old ones, to create an element of surprise.”

Walla listed a number of tips on how to defend against cyberattacks in general and the one scheduled for Thursday in particular.

According to Amir Carmi, chief technology officer at the Israel branch of the security company ESET, it’s not that complicated to protect your computer against attack, as long as you follow the following five simple rules of thumb for safe surfing:

1. Do not click on suspicious links in your email, SMS, What’sApp or social media inboxes. These might look innocent, and can even appear as though they are from friends or contacts. Your guiding principle should be not to click on any such link, unless you know for certain that it is safe.

2. Never open attachments received via email or social media. The exception to this rule is an attachment you receive from someone you trust, and which you know for certain is meant for you. If you receive an unexpected attachment, it is better to ask the sender what it is before opening it.

3. Update your operational system and other programs on your computer regularly. Microsoft updates, Adobe and Java are the most important of these.

4. Do not download programs with which you are unfamiliar and whose source is unknown to you. Particularly suspicious are expensive programs offered for free. Such programs often turn out to be “costly” in other ways. There are many excellent and trustworthy free programs, but try to find user reviews or articles in respectable tech columns before installing any on your computer.

5. Use protection. Anti-viruses or more comprehensive security packages are an additional layer of protection for your computer against malware and other forms of cyberattacks. Make sure your anti-virus has not expired and is up to date.

Anyone interested in free active protection can use the services of Secoz, Walla said, which operates in the field of information security and cyber-defense, and which decided this year to take an active role to help companies fend off damage from the imminent attack.

Share this Story: Share On Facebook Share On Twitter Email This Article

Let your voice be heard!

Join the Algemeiner
  • Sofia B

    Thank you for this information to help us falling victims of computer attacks.

    Furthermore, we wish Israel the best and hopefully, they are intelligent and resourceful to block these attacks. They are smarter and wiser, then their enemies, that have nothing but hate to offer.

  • Kenneth Paul

    I am getting the impression that hackers who have nothing to do with “Anonymous” are using the name to seem larger than they do.

    They have pledged to attack ISIS, Donald Trump, Ted Cruz, police departments and other targets but these attacks never materialized.
    Ken Paul USA

  • As a private individual living, now, in Chile, can I be sunecyex to this attack and can I use the protection system even though I have not a web page? Thank you very much.
    Moises

  • Jackson

    They say that every year; the most they ever do is DDOS some website.

  • Franklin Delano Paskutnik

    If an Israeli company was clever enough to get the better of Apple,as reported,and assist the FBI in it’s investigation of the Muslim terrorist atrocity at San Bernardino,I am sure Israel can handle this one.Why not turn the tables on these anti-Israel cyber terrorists and make April 7 “Support Israel Science and Technology Day”!

  • shloime

    “The exception to this rule is an attachment you receive from someone you trust,” – wrong! many attacks use the contact list of a compromised account, so malware-infested attachments can absolutely appear to be “from someone you trust”. and checking with them via email sometimes doesn’t work either, because hacked email accounts can be hijacked (forwarded) so they go to the hackers, and not to your friends.

    also, the article implies that a simple anti-virus program can provide protection, if kept updated, but that’s not the case. the results from a “multi-vendor” site like http:virustotal.com , which compares results from about 60 different vendors, show that the majority (over 90%) fail to detect malware in any given file. (as tested with a few suspicious attachments, each of which just happened to contain a different trojan. detection rate was 5-8 out of 60 vendors)

    faulty security advice creates a false sense of security while leaving the reader vulnerable.

Algemeiner.com