• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Hacking News

Pics of IDF women soldiers helped hackers to breach Israeli Military Servers

April 18th, 2015 Waqas Hacking News 0 comments
Pics of IDF women soldiers helped hackers to breach Israeli Military Servers
Share on FacebookShare on Twitter

Arab hackers are using pictures of IDF’s women division to hack Israeli military servers — And it’s a success.

Several computer networks belonging to the Israeli military have reportedly been penetrated by Arabic-speaking hackers under a four-month spying campaign.

The modus operandi of these hackers involves using a careful combination of spyware along with deceiving emails attached with tempting images of IDF women soldiers. The Middle Eastern region is proving to be the focal point for cyber spying given the large number of cyber-attack incidents taking place there in the recent past.

Software employed by hackers are made using easily available tools including remote access Trojan known as Poison Ivy. Hackers are not resorting to tailor-made codes given the restricted budget of such attacks. Some of the specific examples of these attacks include emails sent to several military installations with attention-grabbing content such as “Breaking military news” or clips claiming to have “Girls of Israel defense forces”. Software managed to prevent detection by majority of the antiviruses.

pics-of-idf-women-soilders-helped-hackers-to-breach-israeli-military-servers

Image Source: Global Military Review

Independent security research firm, Blue Coat Systems Inc. (Blue Coat), confirmed presence of some malicious softwares within the Israeli government/military servers as the software reportedly “beaconed” or sent logs to the hackers. Further, the research firm intends to release a detailed paper on the incident shortly. The spokeswoman within the Israel defense military denied the incident saying that she is “not aware of hacking on IDF operational networks”.

The investigation done by Blue Coat revealed hackers from Arab origin since one programming tool was by default set to Arabic language. The research firm also cited the possibility of an increase in such spying incidents with attackers of varied skill sets coming to fore owing to continual turmoil in the region.

Various other research firms have also reported incidents of similar nature recently. Check Point Software Technologies (an Israeli security company) reported spying programs from 10 different nations originating from a Lebanon-based political/governmental group, which implemented the program over a period of 3 years.

In another report, researchers at the Kaspersky reported citing of the foremost “highly developed” Arabic-speaking group of hackers, which the firm named “Desert Falcons”. This group of hackers managed to claim almost 3,000 attacks in 50 nations with a particular focus on government, military, activist and media computers.

Source: Reuters

Follow @HackRead

  • Tags
  • Arabs
  • Islam
  • Israel
  • Muslims
  • Palestine
  • security
Facebook Twitter LinkedIn Pinterest
Previous article How to use Google Search to locate lost Android Smartphone or Tablet
Next article Pro-Israeli Jewish Press Website Hacked by ‘Gaza Team’ Hackers
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Malwarebytes says it was also breached by SolarWinds hackers

Malwarebytes says it was also breached by SolarWinds hackers

Hackers compromised IObit forum to spread DeroHE ransomware

Hackers compromised IObit forum to spread DeroHE ransomware

Livecoin crypto exchange shuts down after losing domain to hackers

Livecoin crypto exchange shuts down after losing domain to hackers

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

29
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

73
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

96

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us