JERUSALEM (AP) - A concerted effort of millions of attempts to cripple Israeli websites during the Gaza conflict has failed, Israel’s finance minister said Monday, claiming that the only site that was successfully hacked was back up within minutes.
Cyber security experts said that such hacking attempts have become a new aspect of modern-day warfare and states have to invest in fortifying their virtual defenses on a battleground with vague terrain.
Israel regularly fights off hundreds of hacking attempts every day, but nothing on the scale of the recent torrent of attacks.
To counter the threat, Steinitz said, the government is working in “emergency mode.” He claimed all but one of the attacks has been fended off, and that one knocked a website offline for only 10 minutes.
Anonymous - the multifaceted movement of online rebels and self-described “hacktivists,” spearheaded the campaign against Israel, distributing press releases and videos denouncing what it described as an “insane attack” against Gaza. The cyber onslaught began after Israel launched airstrikes against Gaza last week following persistent rocket fire.
Others have joined into what has effectively become a free-for-all attack on Israel. One group, which called itself the Pakistani Cyber Army, claimed responsibility for having hijacked roughly two dozen Israeli-registered sites, including one belonging to Coca-Cola.
One of its members, who identified himself only as a Pakistani Muslim, told The Associated Press that more was on the way.
“We won’t stop until they stop killing innocent kids and people,” he said.
Much of the online onslaught has come in the form of denial-of-service attacks, a technique that works by overloading a website with traffic.
Tel Aviv-based security company Radware said the attacks against Israel first began surging across the web on Thursday, describing some as well coordinated denial-of-service attacks. Although such attacks can effectively knock their targets off the web, they’re usually temporary and rarely do lasting damage.
Radware said the targets included the Israel Defense Forces, the prime minister’s office, Israeli banks, the Tel Aviv city government, airlines, infrastructure and business sites.
Ronen Kenig, a Radware analyst, said the flow of rogue traffic wasn’t as powerful as attacks that hit the U.S. banking sector two months ago.
“In terms of the amount of traffic, it’s not massive,” he said, explaining that the attackers were yet to draw on networks of infected computers _ known as botnets _ to mount their attacks. Botnets are amassed by hackers and can grow to include thousands of compromised computers, giving them much more firepower than a few dozen online activists acting in tandem.
Government sites aren’t the only ones targeted. Many other apparently randomly chosen Israeli sites have been hit, including an Israeli massage parlor, an obscure luxury car site, an accountancy practice and a university website.