Worldwide Hacktivists Take Sides Over Gaza, With Little to Show for It

Worldwide Hacktivists Take Sides Over Gaza, With Little to Show for It

November 9, 2023 at 10:59AM

Hacktivists from various regions are claiming cyberattacks in support of Palestine or Israel during the Gaza war. However, researchers at SecurityScorecard have found little evidence to support these claims. Hacktivist operations have also been reported in Muslim-majority countries, with some claiming data breaches and others demonstrating access to industrial infrastructure sites. While some attacks have been reported in the media, no confirmed evidence of successful attacks has been found. Security measures such as DDoS protections and firewalls are recommended to protect against potential attacks.

Key Takeaways from Meeting Notes:

1. Hacktivists worldwide are claiming industrial-grade cyberattacks in support of Palestine or Israel, but there is little evidence to support most of these claims.
2. SecurityScorecard researchers have not found compelling evidence of cyberattacks on Israeli organizations in the industrial sector.
3. Hacktivist operations in Muslim-majority countries like Indonesia and Malaysia have also contributed to the online debate.
4. There have been claims of standard data breaches and visual demonstrations of access to industrial infrastructure sites by hacktivists.
5. Russian or Russian-backed groups initially made loud claims with distributed denial-of-service (DDoS) attacks, while Indian and Ukrainian activist groups targeted Iran.
6. The “Soldiers of Solomon” threat actor has made claims of attacking an Israeli power station and stealing data from an IDF military installation, but this has not been independently confirmed.
7. SecurityScorecard analyzed traffic flows to and from Israeli IP addresses associated with water treatment and found no clear evidence of compromise.
8. Protective measures recommended against hacktivist-level actors include implementing standard DDoS protections and firewalls to prevent unauthorized access to operational systems.
9. Organizations should consider additional security measures to safeguard SCADA systems, databases, and remote desktops.

Please let me know if you need any further information or if there’s anything specific you would like me to address.

Full Article