Anonymous attacks against Israeli sites continued Friday

Anonymous-led denial of service attacks continued unabated for the second day Friday against Israeli government and corporate websites in retaliation for airstrikes in the Gaza Strip.

The hacktivist collective started its Operation Israel campaign at 3 a.m. Eastern time Thursday by attacking sites that belonged to the Israel Defense Forces, the Prime Minister's office, Israeli banks, airlines, media outlets and security companies.

Anonymous claimed on a Pastebin post to have defaced or disrupted nearly 100 sites. The actual number could not be confirmed.

However, the flood of Web traffic Anonymous aimed at its targets remained heavy on Friday, said Carl Herberger, vice president of security solutions at Radware, which was monitoring the attacks.

"[The attacks have] actually increased both in ferocity and in types of attack tactics," Herberger said.

Radware was unable to say how many sites were disrupted. However, the attackers were targeting small businesses, as well as government and corporate sites.

"You'd be surprised at the sites that are going down," Herberger said. "They seem to be inconsequential in the scheme of things. It seems almost like personal vendettas."

At the same time, the attackers had taken down temporarily the Tel Aviv government website, as well as portions of the IDF site. "These are the brand name sites they've been going after, and they've been effective at it," he said.

Ideology was the most common motivation behind distributed denial of service attacks last year, according to Arbor Networks' annual Worldwide Infrastructure Security Report. The company found that 35% of DDoS attacks were either politically or ideologically motivated.

The attacks against the Israeli sites followed a few weeks after the online operations of major U.S. banks were disrupted in a series of attacks. Targeted banks included Wells Fargo, Bank of America, JPMorgan Chase and Capital One Financial.

The attackers claimed to be Islamic hacktivists running a grassroots operation, but experts said the sophistication showed that they were well organized and had access to significant resources, an indication that the attacks were state sponsored.A'A

The latest Anonymous campaign involved a number of well-known network flood tools, such as ByteDos3.2, Tor's Hammer and LoIC, which stands for Low Orbit Ion Canon and is a favorite of the group.

The attackers were also using a more sophisticated tool called Dirt Jumper, which was used successfully in the U.S. bank attacks, Herberger said.

"You see this over and over again," he said. "When there's been a successful set of techniques, [hackers] gather the lessons learned and leverage them the next time there's a campaign. It's almost like a military operation."

In a post on AnonPaste, Anonymous said it did not condone violence by either the Palestinians or Israelis. " Both Palestinians and Israelis need to find common ground and end the violence that has already resulted in the deaths of innocent people, including children," the statement said. At the same time, Anonymous described the Israeli attacks on Gaza as the "racist oppression of Palestinian people."

Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.

Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationsisraelsoftwareradwarePastebinOperation Israeldata protectionmalwarecybercrimeAnonymousData Protection | Malwaresecuritylegal

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place