Home / News I have a News Tip

Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack

Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. The incident has been particularly noteworthy among cybersecurity professionals. Wired's Lily Hay Newman writes: "The assault seems to be the first true example of a physical attack being used as a real-time response to digital aggression—another evolution of so-called "hybrid warfare." That makes it a landmark moment, but one that analysts caution must be viewed in the context of the conflict between Israel and Palestine, rather than as a standalone global harbinger."

Why a first: Although physical retaliations have occurred against cyberattacks in the past including in Estonia, Georgia and US 2015 airstrike to assassinate Islamic state hacker Junaid Hussain, these were all planned events plotted out over several months, notes Newman. Israel's weekend attack was a real-time response to the alleged base of an active Hamas hacking group.

Expecting more: Security expert Bruce Schneier says he expects this sort of thing to happen more — "not against major countries, but by larger countries against smaller powers. Cyberattacks are too much of a nation-state equalizer otherwise."

Follow CircleID on
Related topics: Cyberattack
SHARE THIS POST

If you are pressed for time ...

... this is for you. More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Vinton Cerf, Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Share your comments

To post comments, please login or create an account.

Related

Topics

Cybercrime

Sponsored byThreat Intelligence Platform

New TLDs

Sponsored byAfilias

Domain Names

Sponsored byVerisign

Whois

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

DNS Security

Sponsored byAfilias