phishing – www.israelhayom.com https://www.israelhayom.com israelhayom english website Sun, 04 Apr 2021 12:59:34 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.2 https://www.israelhayom.com/wp-content/uploads/2021/11/cropped-G_rTskDu_400x400-32x32.jpg phishing – www.israelhayom.com https://www.israelhayom.com 32 32 Cyber 'incidents' in Israel spike 50% since start of COVID pandemic   https://www.israelhayom.com/2021/04/04/cyber-incidents-in-israel-spike-50-since-start-of-covid-pandemic/ https://www.israelhayom.com/2021/04/04/cyber-incidents-in-israel-spike-50-since-start-of-covid-pandemic/#respond Sun, 04 Apr 2021 13:29:19 +0000 https://www.israelhayom.com/?p=607795   The number of cyber incidents reported in Israel grew by 50% over the past year, the Israel National Cyber Directorate warned on Saturday. Follow Israel Hayom on Facebook and Twitter In its annual report, the agency said that over 14,000 alerts had been filed in Israel throughout 2020. Out of those, 9,000 turned out […]

The post Cyber 'incidents' in Israel spike 50% since start of COVID pandemic   appeared first on www.israelhayom.com.

]]>
 

The number of cyber incidents reported in Israel grew by 50% over the past year, the Israel National Cyber Directorate warned on Saturday.

Follow Israel Hayom on Facebook and Twitter

In its annual report, the agency said that over 14,000 alerts had been filed in Israel throughout 2020.

Out of those, 9,000 turned out to be cyber incidents – a 50% increase over the previous year.

Social network hacking attacks accounted for the bulk of the incidents, comprising about three out of every five incidents.

Identity theft and phishing attacks – cyberattacks designed to goad a user into revealing sensitive information – accounted equally for about another 14% each.

The rest of the incidents entailed cyber intrusions, malware attacks and identification breaches, the authority said.

The technology, energy and government sectors took the brunt of the attacks, the report said, while also listing a few of the major incidents spotted during this period, such as the hack of the Shirbit insurance company and a cyberattack that targeted Israel's water supply and controls.

This article was first published by i24NEWS.

 Subscribe to Israel Hayom's daily newsletter and never miss our top stories!

The post Cyber 'incidents' in Israel spike 50% since start of COVID pandemic   appeared first on www.israelhayom.com.

]]>
https://www.israelhayom.com/2021/04/04/cyber-incidents-in-israel-spike-50-since-start-of-covid-pandemic/feed/
Gaza hackers used phishing attacks to target individuals, corporations in 39 countries https://www.israelhayom.com/2019/04/11/gaza-hackers-used-phishing-attacks-to-target-individuals-corporations-in-39-countries/ https://www.israelhayom.com/2019/04/11/gaza-hackers-used-phishing-attacks-to-target-individuals-corporations-in-39-countries/#respond Thu, 11 Apr 2019 05:06:12 +0000 https://www.israelhayom.com/?p=356295 Kaspersky Lab published its findings on the a cyber espionage operation known as SneakyPastes, which targeted individuals and organizations with Middle-Eastern political interests across 39 countries worldwide. In 2018, the campaign made use of disposable email addresses to spread the virus through phishing attacks before downloading the malware in chained stages using multiple free sites. […]

The post Gaza hackers used phishing attacks to target individuals, corporations in 39 countries appeared first on www.israelhayom.com.

]]>
Kaspersky Lab published its findings on the a cyber espionage operation known as SneakyPastes, which targeted individuals and organizations with Middle-Eastern political interests across 39 countries worldwide. In 2018, the campaign made use of disposable email addresses to spread the virus through phishing attacks before downloading the malware in chained stages using multiple free sites. Since Kaspersky shared its findings with law enforcement, a significant portion of the attack infrastructure has been taken down.

The Arabic-speaking Gaza Cybergang responsible for the campaign is a politically motivated collective of interrelated groups actively targeting the Middle East and North Africa, with a particular focus on the Palestinian territories. Kaspersky Lab has identified at least three groups within the gang. Although these groups share similar aims and targets – cyberespionage related to Middle Eastern political interests, the methods they employed vary in sophistication.

The groups include the more advanced Operation Parliament and Desert Falcons as well as the less sophisticated MoleRats, which was responsible for launching SneakyPastes in the spring of 2018.

SneakyPastes began with politically themed phishing attacks. In order to avoid detection and hide the location of the command and control server, additional malware was downloaded to victim devices in chained stages using a number of free sites including Pastebin and Github. The various malicious implants used PowerShell, VBS, JS and dotnet to secure resilience and persistence within infected systems. The final stage of intrusion was a Remote Access Trojan, which made contact with the command and control server and then gathered, compressed, encrypted and uploaded a wide range of stolen documents and spreadsheets to the server. The name SneakyPastes derives from the attackers' heavy use of paste sites to gradually sneak the RAT onto victim systems.

The SneakyPastes operation was at its most active between April and Nov. 2018, focusing on a small list of targets that comprised diplomatic and government entities, nongovernmental organizations and media outlets. Around 240 high-profile individuals and corporations across 39 countries appear to have fallen victim to the operation, with the majority situated in the Palestinian territories, Jordan, Israel and Lebanon. Victims included embassies, government entities, media outlets, journalists, activists and political parties, as well as organizations in the education, banking, healthcare sectors.

"The discovery of Desert Falcons in 2015 marked a turning point in the threat landscape as it was then the first known fully Arabic speaking APT," said Amin Hasbini, head of Kaspersky's Middle East Research Center global research and analysis team.

"We now know that its parent, Gaza Cybergang, has been actively targeting Middle Eastern interests since 2012, initially relying most on the activities of a fairly unsophisticated but relentless team. … It shows that lack of infrastructure and advanced tools are no impediment to success. We expect the damage exerted by all three Gaza Cybergang groups to intensify and the attacks to extend into other regions that are also linked to Palestinian issues," he said.

The post Gaza hackers used phishing attacks to target individuals, corporations in 39 countries appeared first on www.israelhayom.com.

]]>
https://www.israelhayom.com/2019/04/11/gaza-hackers-used-phishing-attacks-to-target-individuals-corporations-in-39-countries/feed/