Sunday, April 27, 2025
HomeCyber AttackHackers Group Claims To Have Broke Into IDF & Stolen Documents

Hackers Group Claims To Have Broke Into IDF & Stolen Documents

Published on

SIEM as a Service

Follow Us on Google News

Anonymous claims a successful cyberattack against the Israeli Defence Force (IDF), gaining access to 20 gigabytes of data, which allegedly includes over 233,000 military documents in various formats, like PDFs, Word files, and presentations. 

The IDF considers the authenticity of the claim dubious and suspects a psychological warfare tactic.

They reason that their layered, secure computer systems were likely not breached directly, and if a breach did occur, they suspect it compromised civilian systems instead. 

- Advertisement - Google News

Hackers released a video containing purportedly genuine excerpts from IDF presentations, but the IDF dismisses this as a possible psychological warfare tactic, casting doubt on the authenticity of the material. 

The IDF emphasizes the robustness of its computer systems, which are secured with multiple layers of protection, which makes it highly unlikely that the hackers breached the IDF’s core network directly. 

If any IDF information was compromised, it was more likely due to unauthorized access to civilian systems, potentially in violation of IDF regulations.

Earlier this month, a group affiliated with the loose-knit hacktivist collective Anonymous allegedly launched a cyberattack against the Justice Ministry’s IT infrastructure, where the attackers claim to have breached the ministry’s defences and exfiltrated a massive dataset exceeding 300 gigabytes in size. 

This data dump reportedly contains 8 million files, potentially including sensitive personal information.

The group’s motivations remain unclear, but some members have expressed anti-Israeli sentiment, possibly linking the attack to a broader geopolitical agenda.

A computer screen with a red security alert warning.

According to Jerusalem, the national cyber authority issued a warning about a surge in cyberattacks following Ramadan, and the attacks are expected to target Israel and its online infrastructure. 

Potential threats include website breaches, infiltration of digital systems (including smart homes), and leaks of sensitive data.

Hackers might also deploy tracking software and attempt unauthorized access to systems, potentially for purposes of espionage or disruption.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP.

Latest articles

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

Compliance And Governance: What Every CISO Needs To Know About Data Protection Regulations

The cybersecurity landscape has changed dramatically in recent years, largely due to the introduction...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service

The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea...