- Table of contents
The Ramadan Fast: A Possible Wave of Cyber Attacks Against Israeli Targets
Five months have passed since Hamas’s brutal attack against Israeli settlements surrounding the Gaza Strip that led Israel to a declaration of war. The ongoing conflict is accompanied by attacks by militant terror organizations such as Hezbollah (Lebanon), the Houthis (Yemen), and Hacktivists groups. They have been launching multiple cyber-attacks in the form of DDoS, Data Breaches, Phishing campaigns, and system compromises against Israeli institutes, infrastructures, and civilian’s personal information.
Evidence shows that OpIsrael has become a year-round campaign that shifts to high gear around substantial events such as religious holidays, military operations, and the geopolitical status in the Middle East.
The fast of Ramadan, one of Islam’s five pillars, which starts on the week of March 10, is one of those gear changers. The fast of Ramadan lasts for a month and, according to Islam belief, leads to spiritual uplifting. Its religious significance, and the Middle East’s political situation may affect cyber-attack levels. If negotiations for a cease-fire succeed, attacks may stabilize, yet a decrease is unlikely.
Additionally, the OpIsrael campaign conventionally begins on April 7, which this year falls at the end of the Ramadan fast and marks six months since the start of the war against Hamas.
Furthermore, during April, the Jewish holidays of Passover will take place, followed by several Jewish memorial days – Holocaust Memorial Day, Israeli Defense Forces Memorial Day, and Israeli Independence Day. This potentially can keep the momentum of cyber-attacks targeting Israel.
This report aims to explain potential cyber-attacks during Ramadan and steps to mitigate them. It outlines attack vectors and remediations for prevention or mitigation. Following the recommendations outlined in this report, can help better protect against cyber threats and minimize the risk of data breaches, financial loss, and reputational damage.
Cyber Attacks Motivated by The Israeli – Hamas Conflict
Since the war began Cyberint has observed an Anti-Israeli campaign accompanied by multiple attacks by Threat Actors such as Hacktivists and state-funded groups targeting Israeli-related entities domestically and abroad. We assume that the fast of Ramadan, due to its religious importance to Islam, can further motivate those groups to keep attacking Israel and its supporting allies, and even inspire new groups or individuals to join the campaign.
The following examples demonstrate common attack vectors used by Threat Actors. These include DDoS attacks, website defacement, accessing CCTV camera control panels, malware distribution, and data breaches. These attacks are typically targeted at high-value entities, such as governmental institutes, critical infrastructures like electricity and telecommunication, and transportation services. Based on our experience, we believe that these attack vectors will continue to be the most prevalent ones in the upcoming months.
MALWARE DISTRIBUTION
- During the cease-fire in November 2023, an advanced persistent threat (APT) group, seemingly related to the terror organization Hamas, known as Gaza Cybergang aka Molerats, launched an attack against Israeli targets using a refurbished Malware variant called SysJoker a cross- platform remote access backdoor trojan that can affect Windows, Mac, and Linux. The attack vectors are Email attachments, Malicious Ads, and Malicious software.
- The newly emerged politically motivated BiBi-Linux Wiper malware, named after the Israeli Prine Minister Benjamin Netanyahu, targets Israeli companies using Linux systems, and its uniqueness is that it doesn’t encrypt files or offer a decryption key. Instead, it corrupts files and overwrites them with useless data, causing damage to both the data and the operating system.
DATA BREACHES
- On March 3, a Hacktivists group called Lord Nemesis published on their Telegram channel compromised sensitive data accumulating to about 50GB related to an Israeli company named Rashim, offering organizational procedures improvement services to her clients one of them being the Israeli Police Academy. Furthermore, the group shared images and videos of what appeared to be the company CEO’s personal data and compromised Microsoft’s work account.
- On November 26, the known Hacktivists group GhostSec published a 151GB data leak that exposed sensitive information seemingly related to Israeli companies and government agencies, including the Ministry of Defense and the Nuclear Research Department. The data includes confidential documents, customer data, and information on connected companies, originating from an Israeli construction company.
DISTRIBUTED DENIAL OF SERVICE ATTACKS
This is the most common attack conducted by hacktivist groups since it can be easily launched, it requires basic online accessible knowledge, and those who lack it can acquire the service or a bot to launch the attack for them for different purposes.
More advanced groups, believed to hold a state backed infrastructure, such as the notorious Anonymous Sudan have launched more distractive DDoS attacks targeting larger targets. For example, on January 12, the group claimed to have successfully launched an “unprecedented & catastrophic cyber-attack” targeting the largest telecommunications company Bezeq, taking responsibility for any damage done to it and related services.
Furthermore, the group offers a tailor-made DDoS service for hire named InfraShutdown leveraging campaigns targeting governments, agencies, and individuals.
Lately, we have also witnessed an additional hacktivist group, named DarkStormTeam who offers DDoS service for sale.
A Call for Action
Cyberint conducted further analysis using Argos™ and was able to observe two posts (LulzSec, Ghosts of PS) calling for action during the month of Ramadan, joining the OpIsrael campaign. It most likely that more groups will join and spread the call, even more so if no cease-fire agreement is established and Muslims will be forbidden to enter the Al-Aqsa Mosque for Ramadan prayers on the Temple Mount in Jerusalem.
Notably, the following post was removed from the Ghost of PS Telegram channel, from unclear reasons.
As we are distancing from October 7, we see a decline in the mentions of the Hashtag OpIsrael. However, the Hashtag is not used in every launched attack, and the number of mentions in March is only until the 10th of March so it could change significantly.
Summary and Recommendations
Israel has been at war for the last five months, facing multiple fronts at the south border, north border, and in the cyber realm which has no borders. This has enabled multiple Threat Actors to join the fight and launch cyber-attacks in the form of DDoS, Data Breaches, and system compromises against Israeli institutes, infrastructures, and civilian’s personal information.
As mentioned, OpIsrael is an ongoing campaign that rescales according to different, not necessarily cyber-related events. The fast of Ramadan is one of those that starts on the week of March 10, and we are already witnessing a call to action and threats against Israel while keeping the military activity in Gaza relevant. Taking into consideration the religious importance of Ramadan, and the current geopolitical situation in the Middle East, we expect an influx in cyber-attacks in the upcoming month, continuing into April and Israeli holidays and memorial days.
During this period of time, Cyberint will keep monitoring Threat Actors, and hacktivist groups activity for additional IOCs that could indicate potential targets. It is advised to prepare the security network infrastructure for a DDoS type of attack by ensuring the following tools and procedures are set up accurately:
- Load balancer server that will ensure you do not have any network bottlenecks or single points of failure.
- Firewall and intrusion detection systems that can act as traffic-scanning barriers between networks.
- Backup server infrastructure and DDOS response plan in case of a successful DDOS attack
It is advised to prepare the security network infrastructure for Data Breach attempts by ensuring the following tools and procedures are set up accurately:
- Utilizing parameterized database queries with bound, typed parameters and careful use of parameterized stored procedures in the database.
- Firewall, WAF, and intrusion detection systems to be able to block any suspicious activity.
- Endpoint security ensures network endpoints do not become an entry point for malicious activity.
- Segregate SQL servers containing sensitive information from SQL servers that are front-facing and receive data from users as much as possible.
It is advised to prepare the security network infrastructure for a Malware Distribution type of attack by ensuring the following tools and procedures are set up accurately:
- Implement strategies to prevent future attacks, such as updating security policies and educating users about Phishing emails and SMS.
- Immediately report any suspected malware and related vulnerabilities.
- Actively use antivirus and anti-malware tools to scan for and detect malware presence.
If infected systems are found, isolate them to prevent the malware from spreading.
About Cyberint
Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patented technology provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web.
A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into major incidents. Global customers, including Fortune 500 leaders across all major market verticals, rely on Cyberint to protect themselves from an array of external risks, including vulnerabilities, misconfigurations, phishing, impersonation attacks, malware infections, exposed credentials, data leaks, fraud, and 3rd party risks.
For more information or to get a demo visit this page.
Uncover your compromised credentials from the deep and dark web.
Fill in your business email to start.