Hackers broke into an Israeli defense ministry computer via
an email attachment tainted with malicious software that looked like it had
been sent by the country's Shin Bet secret security service, an Israeli cyber
security firm said on Sunday.
Aviv Raff, chief technology officer at Seculert, said the
hackers earlier this month temporarily took over 15 computers, one of them
belonging to Israel's Civil Administration that monitors Palestinians in
Israeli-occupied territory.
Raff told Reuters that Palestinians were suspected to be
behind the cyber attack, citing similarities to a cyber assault on Israeli
computers waged more than a year ago from a server in the Hamas-ruled Gaza
Strip.
While the latest attack was conducted from a server in the
United States, experts noticed writing and composition similarities with the
earlier attack, he said.
Israeli officials declined to comment on Raff's findings.
"We are not commenting on it, we don't respond to such reports," said
one of the officials, Guy Inbar, a spokesman for the Civil Administration.
There was no immediate Palestinian comment on the report.
Securlet had not determined what the hackers did after the
initial infection with "Xtreme RAT" software, Raff said. "All we
know is at least one computer at the Civil Administration was in control of the
attackers; what they did we don't know."
The Civil Administration is a unit of Israel's defence
ministry that oversees the passage of goods between Israel and the West Bank and
Gaza Strip, territories Israel captured in a 1967 war and which Palestinians
want for a state.
The administration also issues entry permits to Palestinians
who work in Israel.
Defense Contractors also hacked?
Raff declined to identify the other 14 computers targeted by
the hackers. An Israeli source who spoke on condition of anonymity said these
included companies involved in supplying Israeli defense infrastructure.
Based on Raff's analysis the 15 computers were in the
hackers' grip for at least several days after the Jan. 15 dispatch of the
email, which included an attachment about ex- Israeli prime minister Ariel
Sharon who had just died.
Hacking activity has surged in the Middle East over the past
three years as both governments and activist groups have targeted the military,
other state agencies, critical infrastructure, businesses as well as dissidents
and criminal groups in order to gain information about their operations and
also disrupt them.
The email that burrowed into the Israeli defense ministry
computer looked like it had been sent from the Shin Bet security service, Raff
said.
Raff's firm was able to "sinkhole" the operation,
tricking the Xtreme RAT software into communicating with servers that Seculert
controlled in order to figure out which computers were infected and to
deactivate the attack.
Xtreme RAT is a remote access trojan, which gives hackers
complete control of an infected machine. They can steal information, load
additional malicious software onto the network or use the compromised computer
as a beachhead from which to conduct reconnaissance and attempt to gain deeper
access into the network, Raff said.
Word of the cyber attack came a day before a three-day
Israeli cybertech conference being held in Jerusalem, and just after Prime
Minister Benjamin Netanyahu plugged Israeli technological advances at the World
Economic Forum in Davos.
Raff denied there was any irony in the timing of his warning
so soon after Netanyahu's remarks.
"Unfortunately there is no such thing as 100 percent safety either when it comes to physical risks or information security," he said.
"Unfortunately there is no such thing as 100 percent safety either when it comes to physical risks or information security," he said.
No comments:
Post a Comment