#OpIslam Activity Observed in Reaction to Events on the Ground

Target: Governmental sites and major corporations in Muslim majority nations.
Attack Vector: Server targeting, DDoS attacks.
Threat Actor: @EZRA; @BLASTER.
Summary: As predicted, #OpIslam has seen an increase in activity towards the end of May. The rise comes with attacks predominantly originating from Israel, the primary nation with an interest in the campaign, as a counter for the #OpIsrael campaign carried out by many pro-Palestinian and Iranian groups against Jerusalem. Israel has countered the rise of attacks seen in May due to Holocaust Remembrance Day, the opening of the US embassy in Israel and the 70th anniversary of the Jewish state. Activity against Israel remained high after this due to Palestinian-Israeli clashe,s as well as tensions between Israel and Iran due to the uncertainty regarding the Iran nuclear deal and the situation in Syria. The response we have been expecting for some weeks has now materialised with targets in Palestine and Iran struck by cyber attacks originating from Israel.
Risk assessment summary: The threat is assessed as 4b LOW. While these attacks under the #OpIslam banner do not directly affect business for Western nations, retaliatory attacks could well do so. The more sophisticated operations such as intelligence gathering could put data at risk for Western nations with much communication between the US and Britain with allies such as Israel and Saudi Arabia. Despite this, the likelihood of this is low from a hacktivist perspective and attacks which affect Western nations are likely to be of a lower sophistication.

Leave a Reply

Your email address will not be published. Required fields are marked *