Gaza Conflict Paves Way for Pro-Hamas Information Operations

Gaza Conflict Paves Way for Pro-Hamas Information Operations

October 13, 2023 at 12:29PM

Researchers are currently monitoring state-sponsored information operations connected to the Israel-Hamas conflict, but no significant cyber activities have been observed yet. However, experts predict an increase in cyber attacks over time. There have been two notable information operations campaigns identified, one related to Iran and the other to China. The campaigns aim to spread propaganda and influence public opinion. Additionally, researchers expect more espionage activities and threats against critical infrastructure from actors related to Iran and Hezbollah. It is important to approach claims of attacks with skepticism due to the prevalence of misleading information in this complex environment.

Meeting Notes Summary:

– No major state-sponsored information operations related to the Israel-Hamas conflict have been identified, but more attacks are expected in the future as hacktivists and espionage actors become involved.
– Distributed denial-of-service (DDoS) activity, particularly by Anonymous Sudan, is seen as a possible precursor to other political activities.
– Two notable information operations campaigns have been identified: one related to Iran, which aims to promote narratives related to the crisis, and another related to the Dragon Bridge campaign supporting China’s political interests.
– The claims made in these campaigns, such as Israel being humiliated by a small force and Israeli soldiers being afraid of Hamas, have not been verified and should be treated skeptically.
– More espionage activity is expected, especially from Iran and Lebanon-based Hezbollah, and financially motivated cybercrime attacks that involve data exfiltration and leaking (but no collection of ransom payments) are also anticipated.
– Threats and posturing against critical infrastructure will increase, but the severity of such attacks should be questioned as there is often dubious information and claims that cannot be validated.
– Threat actors are taking advantage of the confusing environment to manipulate and influence psychological effects by making false claims that linger without validation, potentially causing adverse effects.

Full Article