OpIsrael

Last updated

OpIsrael (#OpIsrael) is an annual coordinated cyber-attack where hacktivists attack Israeli government and even private websites with DDoS attacks and more. [1] The inaugural campaign was launched in 2013 by Anonymous hackers on the eve of Holocaust Remembrance Day. The campaign has since been held annually. [2]

Contents

The inaugural OpIsrael was reported to have no physical damage and was assessed by the Israeli Government's National Cyber Bureau and by all security experts and journalists to have been a failure. [3] [4] [5] [6]

Targeted websites

Larger than Life, an Israeli NGO devoted to "improving the quality of life and welfare of cancer-stricken children and their families regardless of sex, religion and nationality", stated that in the week leading up to #OpIsrael, its website was targeted repeatedly by pro-Palestinian hackers who defaced it with "flags, a skull, symbols, and all sorts of hate-related things". [7]

In the leadup to the attack, Israeli organizations made preparations to defend their websites, and cyber-security experts called on home users to increase awareness and take precautions such as changing passwords, not opening strange or suspicious emails, and maintaining especial vigilance when using Facebook. The Israel Internet Association (ISOC) operated a hotline for people to report attacks and published real-time status reports on its website. [8] [9]

Yad Vashem, Israel's national Holocaust museum, came under a "fairly massive attack". Nevertheless, its website was fully operational on the day of the attack, which overlapped with Holocaust Remembrance Day. [10] [11]

At midday, #OpIsrael activists announced on Twitter that they had defaced the website of an Israeli hair salon, Peter Hair, in Ramat HaSharon. The salon's home page showed a masked person holding a sign saying "Indonesian Security Down #OP ISRAHELL" and was signed with the message "We are Muslims, Soldier [sic] of Allah". The owner of the salon, Peter Imseis, said he had not been aware that the site had been hacked and that it had not affected his business. [11]

Government websites that experienced problems on 7 April 2013 included those of the Israeli Ministry of Education and Central Bureau of Statistics, but it was unclear whether these problems were caused by #OpIsrael. [1] [12]

During the day, attackers posted numerous false and grandiose claims of successes, such as "Anonymous causes Israel to lose $5 billion" in stock market losses and "Tel Aviv loses all Internet connection". [13]

Responses

The attack was praised by Hamas, the militant Islamist group that controls the Gaza Strip. Hamas spokesman Ihab al-Ghussain wrote: "May God protect the spirit and mission of the soldiers of this electronic war". [14]

A statement on the website of the Tunisian Renaissance Party, signed by party leader Rashid Al-Ghannouchi, expressed "condemnation of all those who do not pursue a policy of dialogue to reach its objectives and follow the methods of terrorists to reach its goals", and threatening "to prosecute anyone involved from Tunisia in attacks on Israel on charges of compromising the security of a foreign state". Tunisians quickly mobilized against the party, with some lawyers offering to defend hackers charged with attacking Israel free of charge. The Renaissance Party later issued a different statement saying that their website had itself been hacked and that the party does not condemn cyberattacks on Israel. [15]

Counterattack

The attack drew a response by pro-Israel hackers, who quickly took over #OpIsrael's website [16] OpIsrael.com [17] [18] and filled it with pro-Israel content. [19] [20] The DNS record of opisrael.com showed a purchase made under the name 'Al Qaeda'. [17] [21] [ original research? ] OpIsrael stated that it had never been their official website, which they said was OperationIsrael.tk/. [22] [ non-primary source needed ]

Related Research Articles

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

<span class="mw-page-title-main">Timeline of Internet conflicts</span>

The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.

<span class="mw-page-title-main">Anonymous (hacker group)</span> Decentralized hacktivist group

Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.

The Jester is a self-identified grey hat hacktivist. He claims to be responsible for attacks on WikiLeaks and Islamist websites. He claims to be acting out of American patriotism.

Teamp0ison was a computer security research group consisting of 3 to 5 core members. The group gained notoriety in 2011/2012 for its blackhat hacking activities, which included attacks on the United Nations, NASA, NATO, Facebook, Minecraft Pocket Edition Forums, and several other large corporations and government entities. TeaMp0isoN disbanded in 2012 following the arrests of some of its core members, "TriCk", and "MLT".

Anonymous is a decentralized virtual community. They are commonly referred to as an internet-based collective of hacktivists whose goals, like its organization, are decentralized. Anonymous seeks mass awareness and revolution against what the organization perceives as corrupt entities, while attempting to maintain anonymity. Anonymous has had a hacktivist impact. This is a timeline of activities reported to be carried out by the group.

<span class="mw-page-title-main">Syrian Electronic Army</span> Hacker group affiliated with the Syrian government

The Syrian Electronic Army is a group of computer hackers which first surfaced online in 2011 to support the government of Syrian President Bashar al-Assad. Using spamming, website defacement, malware, phishing, and denial-of-service attacks, it has targeted terrorist organizations, political opposition groups, western news outlets, human rights groups and websites that are seemingly neutral to the Syrian conflict. It has also hacked government websites in the Middle East and Europe, as well as US defense contractors. As of 2011, the SEA has been "the first Arab country to have a public Internet Army hosted on its national networks to openly launch cyber attacks on its enemies".

<span class="mw-page-title-main">Israeli Elite Force</span>

Israeli Elite Force (iEF) is a hacktivism group founded two days before OpIsrael on April 5, 2013, that is responsible for multiple high-profile computer attacks and large scale online vandalism. Targets include ISPs, domain registrars, commercial websites, educational institutions, and government agencies. The group's core members are: mitziyahu, Buddhax, amenefus, bl4z3, r3str1ct3d, Mute, Cyb3rS74r, Oshrio, Aph3x, xxtr, Kavim, md5c, prefix, Cpt|Sparrow, gal-, gr1sha, nyxman and TheGodOfHell.

<span class="mw-page-title-main">2013 Singapore cyberattacks</span> Cyberattacks done on Singaporean websites

The 2013 Singapore cyberattacks were a series of cyberattacks initiated by the hacktivist organisation Anonymous, conducted partly in response to web censorship regulations in Singapore. A member of Anonymous, known by the online handle "The Messiah", claimed responsibility for spearheading the attacks. On 12 November 2013, James Raj was charged in a Singapore court as the alleged "Messiah".

Cyberwarfare is a part of Iran's "soft war" military strategy. Being both a victim and wager of cyberwarfare, Iran is considered an emerging military power in the field.

Ghost Security, also known as GhostSec, is a self-described "vigilante" group that was formed to attack ISIS websites that promote Islamic extremism. It is considered an offshoot of the Anonymous hacking collective. According to experts of online jihad activism, the group gained momentum after the Charlie Hebdo shooting in Paris in January 2015. The group claims to have taken down hundreds of ISIS-affiliated websites or social media accounts and thwarted potential terrorist attacks by cooperating with law enforcement and intelligence agencies. The group uses social media hashtags like #GhostSec - #GhostSecurity or #OpISIS to promote its activities.

<span class="mw-page-title-main">Islamic State Hacking Division</span>

The Islamic State Hacking Division (ISHD) or The United Cyber Caliphate(UCC) is a merger of several hacker groups self-identifying as the digital army for the Islamic State of Iraq and Levant (ISIS/ISIL). The unified organization comprises at least four distinct groups, including the Ghost Caliphate Section, Sons Caliphate Army (SCA), Caliphate Cyber Army (CCA), and the Kalashnikov E-Security Team. Other groups potentially involved with the United Cyber Caliphate are the Pro-ISIS Media group Rabitat Al-Ansar (League of Supporters) and the Islamic Cyber Army (ICA). Evidence does not support the direct involvement of the Islamic State leadership. It suggests external and independent coordination of Pro-ISIS cyber campaigns under the United Cyber Caliphate(UCC) name. Investigations also display alleged links to Russian Intelligence group, APT28, using the name as a guise to wage war against western nations.

Ghost Squad Hackers ("GSH") is a hacktivist group responsible for several cyber attacks. Former targets of the group include central banks, Fox News, CNN, the United States Armed Forces and the government of Israel. The group is led by a de facto leader known as s1ege, and selects targets primarily for political reasons. The group forms a part of the hacktivist group Anonymous.

<span class="mw-page-title-main">Russo-Ukrainian cyberwarfare</span> Informatic component of the confrontation between Russia and Ukraine

Cyberwarfare is a component of the confrontation between Russia and Ukraine since the Revolution of Dignity in 2013-2014. While the first attacks on information systems of private enterprises and state institutions of Ukraine were recorded during mass protests in 2013, Russian cyberweapon Uroburos had been around since 2005. Russian cyberwarfare continued with the 2015 Ukraine power grid hack at Christmas 2015 and again in 2016, paralysis of the State Treasury of Ukraine in December 2016, a Mass hacker supply-chain attack in June 2017 and attacks on Ukrainian government websites in January 2022.

<span class="mw-page-title-main">IT Army of Ukraine</span> Ukrainian cyberwarfare volunteer group

The IT Army of Ukraine is a volunteer cyberwarfare organisation created at the end of February 2022 to fight against digital intrusion of Ukrainian information and cyberspace after the beginning of the Russian invasion of Ukraine on February 24, 2022. The group also conducts offensive cyberwarfare operations, and Chief of Head of State Special Communications Service of Ukraine Victor Zhora said its enlisted hackers would only attack military targets.

Anonymous, a decentralized international activist and hacktivist collective, has conducted numerous cyber-operations against Russia since February 2022 when the 2022 Russian invasion of Ukraine began.

Anonymous Sudan is a hacker group that has been active since mid-January 2023 and believed to be originated from Russia with no links to Sudan or Anonymous. They have launched a variety of distributed denial-of-service (DDoS) attacks against targets.

References

  1. 1 2 As cyber-war begins, Israeli hackers hit back, Times of Israel 07-04-2013
  2. Why did Anonymous have to attack Israel on Holocaust Memorial Day?, Forbes 08-04-2013
  3. Hackers target Israeli websites, Ynet News 07-04-2013
  4. Botched mission? #OpIsrael cyberattack fails to frustrate Israeli govt, Al-Arabiya 07-04-2013
  5. Why #OpIsrael Was an #OpFail, The Daily Beast 08-04-2013
  6. Anonymous Attacks On Israel ‘Have Achieved Next To Nothing’, TechWeek europe 08-04-2013
  7. Hackers Target Website for Children with Cancer, Israel National News 06-04-2013
  8. Israeli cyber activists attack anti-Israel hackers, Jerusalem Post 07-04-2013, Admin Takeover, Database Breaches and Leaks, Admin Panel Takeover, Defacement and other means.
  9. On eve of attack, Israel preparing for the cyber-worst, Times of Israel 05-04-2013
  10. Experts: Anonymous' Israel hacking 'amateur' so far, Jerusalem Post 07-04-2013
  11. 1 2 Israel Says It Repelled Most Attacks on Its Web Sites by Pro-Palestinian Hackers, New York Times 07-04-2013
  12. Anonymous hacker attack on Israeli websites 'causes little real damage', The Guardian 08-04-2013
  13. Major failures, minor successes for anti-Israel hackers, Times of Israel 08-04-2013
  14. Cyberwarfare: Hackers launch attacks on Israel, Der Spiegel 07-04-2013 (German)
  15. Egypt’s ‘war of the streets’, Times of Israel 08-04-2013
  16. Anonymous Fails to 'Wipe Israel from Internet', International business Times 08-04-2013
  17. 1 2 #opIsrael: Hackers launch opisrael.com website Cyber War Zone 03-16-2013
  18. Anonymous Indonesia Twitter post regarding OpIsrael.com Twitter 16-03-2013
  19. Israeli takes over OpIsrael hacktivist website, Jerusalem Post 09-04-2013
  20. #OpIsrael Backfires, Jerusalem Post (blogs) 07-04-2013
  21. Old domain records for OpIsrael.com Whois.ws
  22. OpIsrael Twitter 9-4-2013