Prohibited terrorist group goes into cyberspace

The initiative of the Atlantic Council of Cyber-Saovite Directorate Simon Handler claims that the Palestinian group of Hamas will expand in cyberspace and conduct offensive operations.

in prepared document Handler calls on the United States to more carefully monitor the growing offensive capabilities of militants and terrorist organizations. It is worth noting that Hamas was recognized as a terrorist organization of the United States, Canada, the European Union and other Western countries.

According to Handler, Hamas is still given priority to the espionage. In his report, Handler called Hamas “a hacker in a green hat.” In the IB community, this term describes the novice and inexperienced hacker, but completely committed to its goal.

In addition, the grouping conducted a cyberspiration campaign in Israel during the 2012 World Cup, when I introduced a spy software in a popular Android app called Golden Cup and received a huge amount of data from hackles.

The group also hacked the devices of Israeli soldiers and collected confidential information about various bases, offices and military equipment of the Israeli Defense Army (IDF).

The growing cyber outcome of the group, along with its propaganda tactics, pose a threat to Israel, the Palestinian administration and the interests of the United States in the region, especially in combination with the capabilities of the group to finance and carry out offensive cyber attacks

However, Hamas cyberoperations continue to this day. For example, Hamas uses harmful software with improved security mechanisms. This indicates that the group is trying to ensure the safety of their cyberspione missions in Israel and on the western coast, where Palestine is located.

In 2019, the Israeli defense army responded to Kiberatak Hamas with a missile blow to the building in the gas sector. According to the military, it was there that the headquarters of the attackers were located. This was the first case in history when the country responded with military operations to a hacker attack during an active conflict.

/Media reports.