Earlier this month hackers infiltrated the Israeli Ministry of Defence through an infected email attachment and took complete control of at least one machine, suggests research from Seculert.
According to Aviv Raff, CTO of the Israeli security company, the way the malware code was deployed hints at Palestinian involvement.
The exact reason behind the attack is unknown. Israeli authorities have refused to comment on the topic.
According to Raff, the attack was initiated on 15 January through a mass email that claimed to originate from the Shin Bet, Israel’s internal security service, and contain information about the death of former prime minister Ariel Sharon.
Raaf said only the Civil Administration’s public network was affected and that no classified communications were compromised. He told Reuters the tools and methods used in this attack were similar to those favoured by hackers linked to Palestine.
The attack came as Israel’s Prime Minister Benjamin Netanyahu was busy promoting the country’s technology and cyber security markets at the World Economic Forum in Davos, Switzerland.
“Gaining control of computer systems via an email attachment is so old school that it is akin to breaking into the NSA headquarters with a trebuchet,” commented Phil Barnett, VP of Global Accounts at Good Technology. “The success of this social engineering technique to infiltrate systems highlights the danger of human error within cyber security defences. It is critical that employee decisions and instincts are supported by cyber technologies that caution their movements without restricting workflows.
“The potential for malware infection is increasingly significant as more entry points and devices are connecting to networks. The mobility of the 21st century calls for a new era of cyber defences, but this incident reminds us that we can’t forget the old.”
Over the last few years, the Middle East has become a battleground for hackers serving various political interests. Iran had previously accused Israel of attacking its oil platforms, and it is understood that Stuxnet, the malware used to derail Iran’s nuclear programme, was made in collaboration between Israel and the US.
Netanyahu recently claimed Iran and its Palestinian and Lebanese allies are targeting critical Israeli infrastructure with “non-stop” cyber attacks.
Meanwhile, the Syrian Electronic Army is quickly making a name for itself thanks to highly visible attacks on technology and media companies.
How well do you know network security? Try our quiz and find out!
Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…
Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…