• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 

Esse Health data breach impacted 263,000 individuals

 | 

Europol dismantles €460M crypto scam targeting 5,000 victims worldwide

 | 

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

 | 

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

 | 

Canada bans Hikvision over national security concerns

 | 

Denmark moves to protect personal identity from deepfakes with new copyright law

 | 

Ahold Delhaize data breach affected over 2.2 Million individuals

 | 

Facebook wants access to your camera roll for AI photo edits

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 51

 | 

Security Affairs newsletter Round 530 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Gaza-linked hackers and Pro-Russia groups are targeting Israel

Gaza-linked hackers and Pro-Russia groups are targeting Israel

Pierluigi Paganini October 09, 2023

Microsoft linked a Gaza-based threat actor tracked as Storm-1133 to a series of attacks aimed at private organizations in Israel.

The fourth annual Digital Defense Report published by Microsoft linked a series of attacks against organizations in Israel to a Gaza-based threat actor that is tracking the campaign as Storm-1133.

The Storm-1133 activity was observed in early 2023 and is targeting Israeli private-sector energy, defense, and telecommunications organizations.

“We assess this group works to further the interests of Hamas, a Sunni militant group that is the de facto governing authority in the Gaza Strip, as activity attributed to it has largely affected organizations perceived as hostile to Hamas.” reads the report published by Microsoft. “Targets have included organizations in the Israeli energy and defense sectors and entities loyal to Fatah, the dominant Palestinian political faction in the West Bank, which were historically targets of Hamas cyberattacks.”

Threat actors behind Storm-1133 sent out spear-phishing messages via email and social media, Microsoft also observed the use of new techniques to evade detection. The threat actors employed multiple backdoors and hosted their C2 infrastructure on Google Drive.

“Storm-1133 also used newly created LinkedIn profiles—masquerading as Israeli human resources managers, project coordinators, and software developers to conduct reconnaissance, contact and send malware to employees at Israeli defense, space, and technology organizations throughout 2023.” states the report.

Gaza Hamas Israel

While the Hamas group was launching a massive attack against Israel, multiple Pro-Palestine hackers launched cyber attacks against organizations in the country.

The Jerusalem Post was hit by multiple cyberattacks that caused the site to crash.

The Jerusalem Post has been targeted by multiple cyberattacks this morning causing our site to crash.

We'll be back soon and will continue to be the top source of information on Operation Swords of Iron and the murderous attacks by Hamas. pic.twitter.com/6S2GOl6Wma

— The Jerusalem Post (@Jerusalem_Post) October 8, 2023

Most of the attacks are distributed denial-of-service (DDoS) attacks and also targeted critical Israeli infrastructure.

“Over 35 pro-Palestine hacking groups have commenced a series of attacks on diverse targets within Israel.” reported The Cyber Express. “These groups, while advocating for Palestinian interests, remain shrouded in mystery, their exact numbers and identities are yet to be verified.”

Below is the list of hacker groups involved in the Israel-Palestine war: 

Pro-Palestine Hacking 35 GroupsPro-Israel 4 Hacking Groups
Mysterious Team BangladeshTeam UCC Operations
Ghosts of PalestineIndian Cyber Force
AnonGhostGaruna Ops
Blackshieldcrew MYSilentOne
Anonymous Sudan
Ganosec team
Team Azrael Angel of Death
Moroccan Black Cyber Army
Gb Anon 17
Electronic Tigers Unit
YourAnon T13x
Hizbullah Cyb3r Team
StarsX Team
SynixCyberCrimeMY
Eagle Cyber Crew
Kerala Cyber Xtractors
Panoc team
Sylhet Gang-SG
Muslim Cyber Army
Team Herox
GhostClan
Team_insane_Pakistan
Garnesia Team
Hacktivism Indonesia
4 Exploitation
Team_r70
Stucx Team
Cscrew
TYG Team
Ghost Clain Malaysia
1915 Team
Anonymous Morocco
Pakistani Leet Hackers
Cyber Av3ngers

The Pro-Russia group Killnet also announced a series of attacks against Israel with the support of another group known as ‘Usersec.’ The Pro-Russia hackers launched their attacks against Israel’s banking and power sectors, however the group excludes the possibility of attacking the critical infrastructure in Israel.

Below is the message published on the Telegram channel of the group:

“If we oppose the Israeli government, this does not mean that we are going against ordinary citizens of this country. The Israeli regime sold itself to the NATO whore, the same main terrorist, with the slogan of PEACE and DEFENSE!

The atrocities that Hamas or Israel commit against civilians are terrible! We exclude the possibility of attacking the critical infrastructure of both sides! Our goal is the pro-NATO government of Israel (believe me, there are not many of them left anymore)!

Our brothers and sisters are all civilians and peaceful residents of Israel!

We call on you to stop the bloodshed on both sides! If you want war, there are thousands of kilometers of emptiness around you, fight there. Civilians of Gaza and Israel do not have the right to give their lives for the sake of bastards from Europe.”

The hacker group Anonymous Sudan, which is a Pro-Russia group not linked to Anonymous, has announced its support to Hamas on Telegram.

The group hit The Jerusalem Post website and claimed to have targeted Israel’s Iron Dome and the Israeli Alerting system.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Israel)


facebook linkedin twitter

DDoS Gaza Hacking hacking news Hamas information security news Israel IT Information Security KillNet Pierluigi Paganini Security Affairs Storm-1133

you might also like

Pierluigi Paganini July 03, 2025
China-linked group Houken hit French organizations using zero-days
Read more
Pierluigi Paganini July 03, 2025
Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    China-linked group Houken hit French organizations using zero-days

    APT / July 03, 2025

    Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

    Data Breach / July 03, 2025

    Europol shuts down Archetyp Market, longest-running dark web drug marketplace

    Cyber Crime / July 03, 2025

    Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

    Uncategorized / July 03, 2025

    Cisco removed the backdoor account from its Unified Communications Manager

    Security / July 02, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT