Hackers managed to get into the systems of the Israeli Defense Ministry

Father

Professional
Messages
2,605
Reputation
4
Reaction score
585
Points
113
Sources claim that the secret data was stolen and put up for sale.

In a recent series of cyber attacks, an unknown group of hackers penetrated the systems of two key Israeli agencies – the Ministry of Defense and the Ministry of Justice – raising concerns at the highest levels of State security.

Sources confirmed that the attack on the Ministry of Defense ended with a successful hack, as a result of which documents were stolen and published in Telegram groups, allegedly revealing internal correspondence and orders of the department. The attackers claim to have a vast array of data and offer it for sale for 50 bitcoins, which is equivalent to approximately $3.5 million.

In addition to the ransom, the hackers demanded the release of 500 prisoners for committing terrorist acts in exchange for non-proliferation of the collected data. Israeli security officials declined to discuss details, confirming only the fact of penetration.

Israeli media also recalled that on April 5, during an attack on the Ministry of Justice, hackers managed to gain access to hundreds of gigabytes of data, including personal information of employees and official documents. Despite the Ministry of Justice's denial of the attack, sources claim that about 100 GB of sensitive information is already circulating on the network.

Hackers carry out their actions as part of an annual campaign against Israel called OpIsrael (Operation Israel), held every April. Last year, the campaign targeted irrigation systems in northern Israel, as well as the Israeli Post Office.

Cybercriminals also claimed that they were able to break into the missile attack warning system integrated into the Iron Dome anti-missile defense system, in the functioning of which violations were recorded. Israeli army officials did not comment on the matter.

The authorities are strengthening information security measures, recalling strict security procedures designed to prevent such incidents, including mandatory checks and investigations for any attempts to gain unauthorized access to the networks of defense and law enforcement agencies.
 
Top