Wednesday, December 18, 2024
HomeCyber AttackHackers Group Claims To Have Broke Into IDF & Stolen Documents

Hackers Group Claims To Have Broke Into IDF & Stolen Documents

Published on

SIEM as a Service

Anonymous claims a successful cyberattack against the Israeli Defence Force (IDF), gaining access to 20 gigabytes of data, which allegedly includes over 233,000 military documents in various formats, like PDFs, Word files, and presentations. 

The IDF considers the authenticity of the claim dubious and suspects a psychological warfare tactic.

They reason that their layered, secure computer systems were likely not breached directly, and if a breach did occur, they suspect it compromised civilian systems instead. 

- Advertisement - SIEM as a Service

Hackers released a video containing purportedly genuine excerpts from IDF presentations, but the IDF dismisses this as a possible psychological warfare tactic, casting doubt on the authenticity of the material. 

The IDF emphasizes the robustness of its computer systems, which are secured with multiple layers of protection, which makes it highly unlikely that the hackers breached the IDF’s core network directly. 

If any IDF information was compromised, it was more likely due to unauthorized access to civilian systems, potentially in violation of IDF regulations.

Earlier this month, a group affiliated with the loose-knit hacktivist collective Anonymous allegedly launched a cyberattack against the Justice Ministry’s IT infrastructure, where the attackers claim to have breached the ministry’s defences and exfiltrated a massive dataset exceeding 300 gigabytes in size. 

This data dump reportedly contains 8 million files, potentially including sensitive personal information.

The group’s motivations remain unclear, but some members have expressed anti-Israeli sentiment, possibly linking the attack to a broader geopolitical agenda.

A computer screen with a red security alert warning.

According to Jerusalem, the national cyber authority issued a warning about a surge in cyberattacks following Ramadan, and the attacks are expected to target Israel and its online infrastructure. 

Potential threats include website breaches, infiltration of digital systems (including smart homes), and leaks of sensitive data.

Hackers might also deploy tracking software and attempt unauthorized access to systems, potentially for purposes of espionage or disruption.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary...

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files...

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...