Tuesday, March 4, 2025
HomeCyber AttackIsrael Launched Airstrike & Destroyed the Headquarters Building of Hamas Hackers Group

Israel Launched Airstrike & Destroyed the Headquarters Building of Hamas Hackers Group

Published on

SIEM as a Service

Follow Us on Google News

Israel thwarted a cyber attack by launching an Airstrike on headquarters building of Hamas terror group technology division in Gaza.

According to Israel Defense Forces, “the digital threat was neutralized, fighter jets destroyed the building housing the headquarters of the terror group’s cyber unit.”

IDF target image

The attack happened in the weekend after an intense fight between the IDF and terror groups in the Gaza Strip. Terror groups launched 600 rockers and mortar shells at Israel.


Israel Airstrikes to Hamas Hackers Group Building

In response to the attacks posted by the terror group, IDF also conducted hundreds of airstrikes on targets linked to terror groups at the Gaza Strip.

“The IDF said the cyber operation was a collaborative effort between the elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.”

According to Israel times, the commander of the IDF’s Cyber Division said that cyber attack that occurred on Saturday aimed at “harming the quality of life of Israeli citizens.”

The military said that the information about the cyber attack cannot be published, it may expose the details to Hamas details about Israel’s cyber capabilities.

According to officials, the cyber attack launched by Hamas was not an advanced one, “We were a step ahead of them the whole time.”

“Israel’s ability to defend itself and thwart cyber attacks means the Hamas terror group’s efforts to carry out attacks in the cyber realm fail time and time again,” a Shin Bet official said.

The operation conducted by IDF is a collaborative between elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.

“What’s special here is that we thwarted this threat under fire, I believe that they know they didn’t succeed in doing what they intended to do,” Dalet said reporters.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Anonymous Hacker Group Destroyed 1 Million Web Pages that Owned by Coca-Cola, ToysRUs, McDonald’s

141 Airlines Worldwide Affected by Biggest Security Vulnerability – Tens of Millions of Flight Travelers Affected

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...