Wednesday, November 13, 2024
HomeCyber AttackIsrael Launched Airstrike & Destroyed the Headquarters Building of Hamas Hackers Group

Israel Launched Airstrike & Destroyed the Headquarters Building of Hamas Hackers Group

Published on

Malware protection

Israel thwarted a cyber attack by launching an Airstrike on headquarters building of Hamas terror group technology division in Gaza.

According to Israel Defense Forces, “the digital threat was neutralized, fighter jets destroyed the building housing the headquarters of the terror group’s cyber unit.”

IDF target image

The attack happened in the weekend after an intense fight between the IDF and terror groups in the Gaza Strip. Terror groups launched 600 rockers and mortar shells at Israel.

- Advertisement - SIEM as a Service

Israel Airstrikes to Hamas Hackers Group Building

In response to the attacks posted by the terror group, IDF also conducted hundreds of airstrikes on targets linked to terror groups at the Gaza Strip.

“The IDF said the cyber operation was a collaborative effort between the elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.”

According to Israel times, the commander of the IDF’s Cyber Division said that cyber attack that occurred on Saturday aimed at “harming the quality of life of Israeli citizens.”

The military said that the information about the cyber attack cannot be published, it may expose the details to Hamas details about Israel’s cyber capabilities.

According to officials, the cyber attack launched by Hamas was not an advanced one, “We were a step ahead of them the whole time.”

“Israel’s ability to defend itself and thwart cyber attacks means the Hamas terror group’s efforts to carry out attacks in the cyber realm fail time and time again,” a Shin Bet official said.

The operation conducted by IDF is a collaborative between elite Unit 8200 of Military Intelligence, the IDF’s Teleprocessing Directorate and the Shin Bet security service.

“What’s special here is that we thwarted this threat under fire, I believe that they know they didn’t succeed in doing what they intended to do,” Dalet said reporters.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Anonymous Hacker Group Destroyed 1 Million Web Pages that Owned by Coca-Cola, ToysRUs, McDonald’s

141 Airlines Worldwide Affected by Biggest Security Vulnerability – Tens of Millions of Flight Travelers Affected

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Automating Identity and Access Management for Modern Enterprises

Keeping track of who has access and managing their permissions has gotten a lot...

Finding The Right E-Commerce Platform – Comparing Reselling Solutions

If you’re looking to make some extra cash or to start a business, you...

Fortinet Patches Critical Flaws That Affected Multiple Products

Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

Researchers Detailed Credential Abuse Cycle

The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a...

Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools

Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market.Unlike traditional standalone ransomware sales, RaaS...