Cyberattack suspected behind false siren alerts in Jerusalem, Eilat


Security officials suspect that rocket sirens heard in Jerusalem and Eilat on Sunday were the result of a cyberattack.

The Israel National Cyber ​​Directorate (INCD) believes hackers may have been behind the incident due to the fact that the sirens activated were civilian rather than part of the Home Front Command network, according to a statement issued Monday by the Israel Defense Forces.

Local authorities have been instructed to take preventive measures against the threat, the statement said.

The Cyber ​​Directorate is examining whether Iranian hackers were behind the alleged attack, according to unsourced reports in Hebrew-language media.

Jerusalem residents reported hearing the sirens in the city’s Katamonim, Beit Hakerem, and Neve Yaakov neighborhoods. They said the alerts lasted for nearly an hour.

In an initial statement on Sunday, the Israel Defense Forces said the sirens were a result of a technical malfunction, but later noted that they sounded on civilian loudspeakers rather than the military’s own network.

Illustrative: A cybersecurity expert stands in front of a map of Iran as he speaks to journalists about the techniques of Iranian hacking, on September 20, 2017, in Dubai, United Arab Emirates. (AP/Kamran Jebreili)

Tensions between Israel and Iran have intensified in recent weeks, after the assassination of a top Iranian officer in Tehran last month that Iran blames on Israel, a number of other deaths of security and scientific personnel inside Iran, airstrikes against Iran-linked targets in Syria , threatening rhetoric from Iranian leaders, and Iran’s increasing violations of nuclear agreements.

These tensions led Israel to urge its citizens in Turkey to leave immediately in recent days, over concerns that Iranian agents were planning to kill or kidnap Israelis there. The warnings came amid unverified reports in the press that Israeli and Turkish intelligence had together thwarted several planned attacks by a broad network of Iranian agents, nabbing some of the suspects.

Israeli cybersecurity firm Check Point Research reported last week that Iranian hackers recently led a spear-phishing operation against high-ranking Israeli and Israel-linked targets, including former foreign minister Tzipi Livni and a former US ambassador to the Jewish state.

Emanuel Fabian contributed to this report.

It’s not (only) about you.

Supporting The Times of Israel isn’t a transaction for an online service, like subscribing to Netflix. The ToI Community is for people like you who care about a common good: ensuring that balanced, responsible coverage of Israel continues to be available to millions across the world, for free.

Sure, we’ll remove all ads from your page and you’ll gain access to some amazing Community-only content. But your support gives you something more profound than that: the pride of joining something that really matters.

Join the Times of Israel Community Join our Community Already a member? Sign in to stop seeing this

You’re a dedicated reader

That’s why we started the Times of Israel ten years ago – to provide discerning readers like you with must-read coverage of Israel and the Jewish world.

So now we have a request. Unlike other news outlets, we haven’t put up a paywall. But as the journalism we do is costly, we invite readers for whom The Times of Israel has become important to help support our work by joining The Times of Israel Community.

For as little as $6 a month you can help support our quality journalism while enjoying The Times of Israel AD-FREEas well as access exclusive content available only to Times of Israel Community members.

Thank you,
David Horovitz, Founding Editor of The Times of Israel

Join Our Community Join Our Community Already a member? Sign in to stop seeing this


Source link

China May oil imports from Russia soar to a record, surpass top supplier Saudi

Ukraine-Russia war: US, West delay in delivering weapons gives Putin edge in Donbas region[placeholder]&tfcd=0&npa=0&sz=640x480&gdfp_req=1&output=vast&unviewed_position_start=1&env=vp&impl=s&correlator=