Tuesday, March 5, 2024

Israel Launched Airstrike & Destroyed the Headquarters Building of Hamas Hackers Group

Israel thwarted a cyber attack by launching an Airstrike on headquarters building of Hamas terror group technology division in Gaza.

According to Israel Defense Forces, “the digital threat was neutralized, fighter jets destroyed the building housing the headquarters of the terror group’s cyber unit.”

IDF target image

The attack happened in the weekend after an intense fight between the IDF and terror groups in the Gaza Strip. Terror groups launched 600 rockers and mortar shells at Israel.

Israel Airstrikes to Hamas Hackers Group Building

In response to the attacks posted by the terror group, IDF also conducted hundreds of airstrikes on targets linked to terror groups at the Gaza Strip.

“The IDF said the cyber operation was a collaborative effort between the elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.”

According to Israel times, the commander of the IDF’s Cyber Division said that cyber attack that occurred on Saturday aimed at “harming the quality of life of Israeli citizens.”

The military said that the information about the cyber attack cannot be published, it may expose the details to Hamas details about Israel’s cyber capabilities.

According to officials, the cyber attack launched by Hamas was not an advanced one, “We were a step ahead of them the whole time.”

“Israel’s ability to defend itself and thwart cyber attacks means the Hamas terror group’s efforts to carry out attacks in the cyber realm fail time and time again,” a Shin Bet official said.

The operation conducted by IDF is a collaborative between elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.

“What’s special here is that we thwarted this threat under fire, I believe that they know they didn’t succeed in doing what they intended to do,” Dalet said reporters.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Anonymous Hacker Group Destroyed 1 Million Web Pages that Owned by Coca-Cola, ToysRUs, McDonald’s

141 Airlines Worldwide Affected by Biggest Security Vulnerability – Tens of Millions of Flight Travelers Affected


Latest articles

CACTUS Hackers Exploiting Software Bug to Attack Corporate Networks

Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting...

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within...

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles