IDF claims they have been hacked

Started by yankeedoodle, October 28, 2021, 09:52:57 AM

Previous topic - Next topic

yankeedoodle

Maybe it's true, and maybe it isn't.   <:^0

Hackers leak 'IDF soldiers' private info & Israeli defense minister's PHOTOS,' claim to have more classified docs
https://www.rt.com/news/538663-israel-defense-gantz-hack/

A shadowy hacking outfit calling itself "Moses Staff" has published a cache of photos and data it claims to have stolen in a cyber attack on the Israeli military, including a series of pictures of Defense Minister Benny Gantz.

In posts on its website and Telegram channel earlier this week, the black hat group released a number of photos of Gantz, claiming it has access to "confidential documents" on the country's Ministry of Defense and the minister himself.

"We've kept an eye on you for many years, at every moment and on each step. All your decisions and statements have been under our surveillance. Eventually, we will strike you while you never would have imagined," the group declared, vowing to publish more confidential information to inform "the world about the Israeli authorities' crimes."

The origin of the photos shared by Moses Staff remains unknown. None of the images published appear sensitive, and most depict Gantz meeting with fellow soldiers and performing other mundane tasks. Another photo shows a copy of a personal letter allegedly sent by Gantz to a colleague in the Jordanian armed forces in 2010, in which Gantz thanks him for his "support and friendship."

The group also reportedly leaked files containing personal information on IDF soldiers and other Defense Ministry personnel, including names, phone numbers, home addresses and ID numbers.

While officials stopped short of confirming a cyber attack on the Defense Ministry, Israel's National Cyber Directorate issued a notice on Wednesday warning of potential vulnerabilities in certain Microsoft software.

"We call upon organizations to implement the latest critical updates that Microsoft has released to deal with these weaknesses, which is a simple, free update that can reduce the risk of this kind of attack," the Cyber Directorate said, as cited by Ynet.

Another section of the Moses Staff website labeled "activities" suggests the group has carried out hacks on a variety of organizations in addition to the MOD, including Israel's postal service and several other businesses. In all, it said it has hacked more than 165 servers and 254 websites, and had compiled over 11 terabytes of data as a result. The veracity of the group's claims could not be confirmed, and it remains unclear how the group obtained any of the material published on its website.

The actors behind Moses Staff have not been identified, and though some reports have claimed the group is Iranian, so far no evidence has surfaced to indicate a national origin. The group's official Twitter handle was created sometime earlier this month, and – writing in Hebrew – lists its location as "Jerusalem."

The purported MOD breach came around the same time as a significant cyber attack in Iran earlier this week, which targeted 'smart fuel pumps' at gas stations across the country, effectively shutting them down. While Iranian officials stated the disruption was the result of a cyber attack, they did not name any culprit.

yankeedoodle

Hacker group Moses Staff announces massive attack on Israel, says in possession of critical facilities maps
https://www.presstv.ir/Detail/2021/11/15/670651/Hacker-group-Moses-Staff-announces-massive-attack-on-Israel

A hacker group called Moses Staff says it has successfully conducted a massive cyberattack against Israel, broken into the servers of major companies, and is now in possession of comprehensive data that could be leaked. 

The group announced on Monday that it had targeted a number of Israeli firms in its latest attack and acquired a vast trove of critical facilities' maps, which include information on the location and characteristics of vital systems across the occupied Palestinian territories.

The data includes airborne mapping surveys with 5-centimeter (2-inch) accuracy and three-dimensional images of Israeli military sites and important buildings.

Moses Staff stated that the information it had was of immense significance, amid international sanctions that prevent accurate access to aerial images of critical areas inside Israeli-occupied Palestinian lands.

A hacker group called Staff of Moses conducts a cyberattack on three Israeli engineering companies days after it leaked files obtained by targeting the regime's ministry of military affairs.
The group later released a video showing photos and maps of the Tel Aviv regime's vital facilities.

Moses Staff stated that the footage is a striking example of accurate images that it has taken over after infiltrating into the servers of Israeli cyber companies.

Unlike the Black Shadow hacker group that has also struck Israeli companies recently, Moses Staff did not make any demands for money or anything else.

On November 3, Moses Staff said it had carried out a cyberattack on three Israeli engineering companies, less than two weeks after it leaked files it said to have obtained in an attack on the Israeli ministry of military affairs.

The group announced at the time that it had targeted Ehud Leviathan Engineering, David Engineers, and HGM Engineering in the attack.

The data leaked from the three companies included projects, maps, contracts, pictures, letters, and videoconferencing images.