OpIsrael prepares for key event amongst constant activity
Target: Israeli government as well as state-owned and affiliated groups
Attack Vector: DDoS attacks, site defacement/hacking, data leaks
Threat Actor: Various, particularly @MCADDoSTeam as well as @LorianSynaro
Summary: We have continued to observe steady activity in the #OpIsrael campaign, most notably originating from @MCADDoSTeam as well as @LorianSynaro. Attacks on the Israeli government have been observed and this type of operation can be expected to peak with Holocaust Remembrance Day period. The most recent incarnation has been dubbed #OpIsrael2018 and is expected to carry on through to the 14th of April. Risk assessment summary: The threat is assessed as 3d MODERATE. While there have been instances of governmental affiliated organisations being targeted, much of the focus is on the government itself. However, there has been evidence of medical organisations in particular being targeted, raising the risk in that sector. There is a high chance these attacks will continue, even after the end of #OpIsrael2018, with events on the ground contributing to increased cyber activity as well as the potential for tit-for-tat attacks between Israel and Arab league countries, particularly under the #OpIslam banner.