Tuesday, June 18, 2024

Israel Launched Airstrike & Destroyed the Headquarters Building of Hamas Hackers Group

Israel thwarted a cyber attack by launching an Airstrike on headquarters building of Hamas terror group technology division in Gaza.

According to Israel Defense Forces, “the digital threat was neutralized, fighter jets destroyed the building housing the headquarters of the terror group’s cyber unit.”

IDF target image

The attack happened in the weekend after an intense fight between the IDF and terror groups in the Gaza Strip. Terror groups launched 600 rockers and mortar shells at Israel.

Israel Airstrikes to Hamas Hackers Group Building

In response to the attacks posted by the terror group, IDF also conducted hundreds of airstrikes on targets linked to terror groups at the Gaza Strip.

“The IDF said the cyber operation was a collaborative effort between the elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.”

According to Israel times, the commander of the IDF’s Cyber Division said that cyber attack that occurred on Saturday aimed at “harming the quality of life of Israeli citizens.”

The military said that the information about the cyber attack cannot be published, it may expose the details to Hamas details about Israel’s cyber capabilities.

According to officials, the cyber attack launched by Hamas was not an advanced one, “We were a step ahead of them the whole time.”

“Israel’s ability to defend itself and thwart cyber attacks means the Hamas terror group’s efforts to carry out attacks in the cyber realm fail time and time again,” a Shin Bet official said.

The operation conducted by IDF is a collaborative between elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.

“What’s special here is that we thwarted this threat under fire, I believe that they know they didn’t succeed in doing what they intended to do,” Dalet said reporters.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Anonymous Hacker Group Destroyed 1 Million Web Pages that Owned by Coca-Cola, ToysRUs, McDonald’s

141 Airlines Worldwide Affected by Biggest Security Vulnerability – Tens of Millions of Flight Travelers Affected


Latest articles

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for...

CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by...

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked...

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data.ARM's...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles