security breach – www.israelhayom.com https://www.israelhayom.com israelhayom english website Sun, 06 Jul 2025 09:53:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.2 https://www.israelhayom.com/wp-content/uploads/2021/11/cropped-G_rTskDu_400x400-32x32.jpg security breach – www.israelhayom.com https://www.israelhayom.com 32 32 How Hamas nearly breached Israel's Unit 8200 with cleaning crew https://www.israelhayom.com/2025/07/06/how-hamas-nearly-breached-israels-unit-8200-with-cleaning-crew/ https://www.israelhayom.com/2025/07/06/how-hamas-nearly-breached-israels-unit-8200-with-cleaning-crew/#respond Sun, 06 Jul 2025 09:50:48 +0000 https://www.israelhayom.com/?p=1070827 Troops in Gaza have recently uncovered Hamas' calculated attempt to infiltrate Israel's premier signals intelligence unit through a routine cleaning services contract, forcing immediate security protocol reforms. The IDF team for documentation and exploitation of enemy materiel captured documents showing the terror organization's plan to exploit civilian contractor access as pathway into Unit 8200's classified […]

The post How Hamas nearly breached Israel's Unit 8200 with cleaning crew appeared first on www.israelhayom.com.

]]>
Troops in Gaza have recently uncovered Hamas' calculated attempt to infiltrate Israel's premier signals intelligence unit through a routine cleaning services contract, forcing immediate security protocol reforms. The IDF team for documentation and exploitation of enemy materiel captured documents showing the terror organization's plan to exploit civilian contractor access as pathway into Unit 8200's classified base.

International Red Cross (ICRC) vehicles as they arrive in Nuseirat in the central Gaza Strip to receive three Israeli hostages on February 22, 2025 (AFP / Bashar TALEB)

The unit, similar to the American government's National Security Agency in the Pentagon, is Israel's elite signal intelligence arm and has been credited with major successes in the ongoing war – including against Hezbollah and Iran – despite the major lapses during the run up to the Oct. 7.

The Hamas attempt to breach the unit came after an online cleaning services tender was posted for one of Unit 8200's facilities. Technical intelligence materiel seized in Gaza during later IDF activities revealed that Hamas had discovered this cleaning tender and used it as a potential pathway to access the Unit 8200 installation.

The tender was immediately put on hold and the IDF issued directives to strengthen protocols for military publications on public internet platforms.

The post How Hamas nearly breached Israel's Unit 8200 with cleaning crew appeared first on www.israelhayom.com.

]]>
https://www.israelhayom.com/2025/07/06/how-hamas-nearly-breached-israels-unit-8200-with-cleaning-crew/feed/
Black Shadow leaks info on hundreds of thousands more Israelis https://www.israelhayom.com/2021/11/03/black-shadow-leaks-info-on-hundreds-of-thousands-more-israelis/ https://www.israelhayom.com/2021/11/03/black-shadow-leaks-info-on-hundreds-of-thousands-more-israelis/#respond Wed, 03 Nov 2021 07:24:46 +0000 https://www.israelhayom.com/?p=712055   Hours after leaking the personal details of users of an LGBTQ dating app, Iran-affiliated hacker group Black Shadow continued to wreak havoc Tuesday night as it released private information on nearly 300,000 Israelis receiving medical treatment at the Mor Institute, including patient requests and test results. Follow Israel Hayom on Facebook and Twitter Patients' […]

The post Black Shadow leaks info on hundreds of thousands more Israelis appeared first on www.israelhayom.com.

]]>
 

Hours after leaking the personal details of users of an LGBTQ dating app, Iran-affiliated hacker group Black Shadow continued to wreak havoc Tuesday night as it released private information on nearly 300,000 Israelis receiving medical treatment at the Mor Institute, including patient requests and test results.

Follow Israel Hayom on Facebook and Twitter

Patients' credit card information does not appear to have been leaked at this time.

Black Shadow also published information on some 30,000 registered users of 103FM Radio's website and nearly 500,000 customers of Locker Ambin Ltd.

As was the case in the Atraf leak, the hackers shared the information via an Excel file shared with a new group they created on Telegram. The hackers also provided links allowing others to download information obtained from the Atraf app. The messaging app was forced to take action on the matter after being ordered to do so by the State Attorney's Office.

On Friday evening, BlackShadow announced it had hacked the servers of Israeli internet company Cyberserve. The hackers shuttered the company's servers and threatened to leak data pertaining to hundreds of thousands of users.

Cyberserve is a web hosting company that provides servers and data storage for companies such as the Kan public broadcaster, the Israel Lottery, Taglit-Birthright, the Dan and Kavim public transportation companies, the Children's Museum in Holon, LGBTQ dating app "Atraf," tour booking company Pegasus, the Israeli Children's Museum, and dozens of other sites.

BlackShadow first surfaced last year, with a massive breach of Israeli insurance company Shirbit and later of KLS Capital. Information from both companies' clients was leaked in the days following the breach.

The group, which had threatened to leak the data obtained from Atraf if a $1 million ransom was not paid within 48 hours, claimed to have leaked the entire user database after its demands were not met Tuesday night.

Meanwhile, another group of hackers known as Moses Staff claimed to have broken into the databases of three Israeli engineering firms: H.G.M. Engineering, David Engineer, and Ehud Leviathan Engineering. Moses Staff leaked personal information of those companies' clients, including their identification numbers.

The hackers claimed to "have all of the data and projects of the engineering companies we breached, including maps, pictures of letters, contracts, and more. You can download some of this data from the link below. The company's information will be published gradually," they said.

Moses Staff previously claimed to have accessed information on Defense Minister Benny Gantz and released some of his personal photographs and documents.

Oded Vanunu, the head of Product Vulnerability Research at American-Israeli software firm Check Point, told Israel Hayom: "The full leak from the Atraf website should be a warning sign on the national level and on the level of the companies storing personal information on the Internet. The personal details of Israeli citizens are repeatedly being leaked following cyberattacks that could easily have been prevented. We should assume the information will be used for very precise phishing attacks by additional hacker groups around the world."

Subscribe to Israel Hayom's daily newsletter and never miss our top stories!

 

 

 

 

The post Black Shadow leaks info on hundreds of thousands more Israelis appeared first on www.israelhayom.com.

]]>
https://www.israelhayom.com/2021/11/03/black-shadow-leaks-info-on-hundreds-of-thousands-more-israelis/feed/
Jewish dating app exposes records of 200,000 users https://www.israelhayom.com/2019/06/07/jewish-dating-app-exposes-records-of-200000-users/ https://www.israelhayom.com/2019/06/07/jewish-dating-app-exposes-records-of-200000-users/#respond Fri, 07 Jun 2019 06:34:54 +0000 https://www.israelhayom.com/?p=377359 Jewish dating app JCrush exposed around 200,000 user records due to an unencrypted database, according to a report in the online technology magazine TechCrunch, which exclusively obtained the data from security researchers Noam Rotem and Ran Locar. The records consisted of user names and other information, including, but not limited to, their gender, date of […]

The post Jewish dating app exposes records of 200,000 users appeared first on www.israelhayom.com.

]]>
Jewish dating app JCrush exposed around 200,000 user records due to an unencrypted database, according to a report in the online technology magazine TechCrunch, which exclusively obtained the data from security researchers Noam Rotem and Ran Locar.

The records consisted of user names and other information, including, but not limited to, their gender, date of birth, IP address, religious affiliation, email address and sexual identification, in addition to photos they feature on the app.

"Depending on how the user signed up, the records also show the user's Facebook ID, which points directly to their Facebook profile," reported TechCrunch. "It also includes the access token, which can be used to take over a JCrush user's account without needing their password."

"In some cases, the geolocation data was so accurate it was easy to identify exactly where some users lived, especially in residential neighborhoods," according to the report.

A spokesperson for Northsight Capital, JCrush's parent company, said it was "aware" of the breach and "secured the database immediately when the problem occurred."

"There have not been any indications that the data had been accessed by malicious parties or misused in any way," the spokesperson said.

The post Jewish dating app exposes records of 200,000 users appeared first on www.israelhayom.com.

]]>
https://www.israelhayom.com/2019/06/07/jewish-dating-app-exposes-records-of-200000-users/feed/