OpIsrael (Operation Israel)

SLIIT CS2
5 min readJul 23, 2020

We will Erase Israel from the Internet.

OpIsrael is the subject of its activity on philosophy, economics and religious differences. OpIsrael was initiated by Anonymous in order to demonstrate Israel’s actions in the Israeli Palestinian crisis, “erase Israel from the Internet.” The project is quarterly and was founded in 2012. It begins on 7 April every year and finishes on 20 April. Participants of the Anonymous project involve AnonGhost, Red Cult, Anonymous Lebanon, Mauritania Attackers, Cyber Team Tox, M0oDyPL, the MCA DDoS team, and the LaResistance Hacking Squad.

Israel’s networks and infrastructures have been exposed to mild assaults in recent years. Server defaults and denial-of-service assaults, but also software attacks and data dumps, are the most common tactics. Hackers arrange chats (IRCs), telegram, Twitter and Facebook every year on public channels to discuss the details of the operations. Attackers provide information and practical support for the project to others. They share links to videos, assault instruments and suggest VPNs together with social media goal lists and content.

The amount of DDoS attacks this year was small. Successful attacks last only a few moments because most attackers did not have the power to sustain their website offline. And make matters worse, most performance arguments are incorrect if there was no loss. Several software packages were exchanged before 7 April, but due to current signatures most of these instruments are obsolete and can be quickly mitigated.. In the context of this year’s service, the anonymous care package was re-posted during 2012. Several resources focused on GUI have been exchanged with people such as Windows DoS, LOIC, HOIC, Tsunami, Daya, Abdal ICMP, EbraSha DoS and An0n Str3ss.

Hacking Groups

MajHoul, also identified as the Redcult CyberRog, used three different tools to direct potential attackers. CyberRog has been using three methods specifically designed for denialof-service software on mobile devices. Such methods include Redcult Doser, RC Doours, and LOIC RedCult. RC Doors is a Google Play store clone of the Packet Generator software. They can produce mobile floods of HTTP, ICMP, UDP and TCP, but are typically too low to cause severe damage.

This figure show the content of a website of Israel that corrupted during the attacks.

https://blog.radware.com/security/2017/04/opisrael-2017/

Attackers who still conduct DDoS assaults under the banner of Anonymous are doing so alone. The assault from IRC must no longer be monitored or coordinated. And yet, we don’t see the network-cryphing assaults expected by OpIsrael every year with lone wolves out there with their IoT botnets.

Next year is going to be a time of making or breaking of the project. When Anonymous doesn’t retrace their attacks in the future probably won’t be taken seriously. The shared credibility of OpIsrael has been undermined by the existence of tiny, low-traffic websites, the false claim to DDos and the reposting of data from previous years.

Is OpIsrael Dangerous?

As for every cyber-attack, yes is the quick response. OpIsrael involves lots of hackers attempting to attack websites. Others are teenagers having little else to do and others are severe organizations such as Anonymous. We ought to look at what sort of threats are occurring in this movement as well. The assaults range from bug abuse to web deformation.

A deformation of the website, however inconvenient it can be, is not that harmful but may harm the owner of the website with expensive downtime. Yet if the site’s attackers discover a loophole it may contribute to catastrophic effects such as data theft, malware, IoT penetration and more.

How should prepare for OpIsrael?

In order to protect yourself from the OpIsrael Campaign:

  • Make sure you have up to date web protection that includes layer 7 DDoS Protection, Bot Management, API Security and Advanced WAF. In fact, make sure all of your systems are up to date including systems updates, AV updates, WP version, etc.
  • Trust no one. A popular way of attack is via phishing attempts. Basically, a phishing attack is when the attacker sends you an email or message containing a malicious link. When you click on the link you start the attack. It could lead you to a malicious web site that will steal your info or download a harmful application to your system that can cause all kinds of damage. So, be careful what you click (and this is, in general, good advice and not only for OpIsrael).
  • Backup. Make sure you have an up to date backup and a recovery plan in case you need to use it.

For more information, you can visit the Israeli National Cyber Directorate where you can find helpful information and tools to help you protect yourself.

With Reblaze security solutions, organizations are fully protected from attack campaigns such as OpIsrael and many more. Our fully managed solution not only protects against malicious attacks, but it can also assist with a legitimate, unplanned increase of traffic, as we saw happening in the Covid 19 Outbreak.

https://www.reblaze.com/blog/opisrael-2020/

Stay Home. Stay Drunk. :)

Written by/Chamod Wijetunga — Information Security Analyst [Intern] at CryptoGen- 3rd Year 2nd Semester -Cyber Security Student-SLIIT

--

--