{"id":9582,"date":"2022-03-22T10:41:38","date_gmt":"2022-03-22T13:41:38","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9582"},"modified":"2022-03-22T10:41:38","modified_gmt":"2022-03-22T13:41:38","slug":"ciberataques-contra-sitios-del-gobierno-israeli-los-mas-grandes-en-la-historia-del-pais","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=9582","title":{"rendered":"Ciberataques contra sitios del gobierno israel\u00ed: los m\u00e1s grandes en la historia del pa\u00eds"},"content":{"rendered":"<p>Los ataques DDoS contra las empresas de telecomunicaciones de Israel derribaron sitios del gobierno, lo que provoc\u00f3 un estado de emergencia temporal. Israel ha desarrollado una pol\u00edtica p\u00fablica de ciberseguridad que es s\u00f3lida y \u00e1gil. Ha priorizado la financiaci\u00f3n gubernamental espec\u00edfica para la mitigaci\u00f3n, preparaci\u00f3n y respuesta de ciberataques. Adem\u00e1s, los ciberdelincuentes tambi\u00e9n enfrentan severas consecuencias por sus acciones contra los intereses israel\u00edes.<\/p>\n<hr \/>\n<p>Israel\u2019s Nation Cyber Directorate confirmed in a tweet on Monday that a denial-of-service (DDoS) attack against a telecommunications provider took down several government sites, as well as others not affiliated with the government. The incident led to the Directorate to briefly declare a state of emergency, while sources said the\u00a0<a href=\"https:\/\/www.haaretz.com\/israel-news\/.premium-israeli-government-sites-crash-in-cyberattack-1.10674433\" target=\"_blank\" rel=\"noopener\">cyberattack was the largest ever against Israel<\/a>.<\/p>\n<p>\u201cUpdate: In the last few hours, a [DDoS] attack has been identified on a communications provider which, as a result, has for a short time prevented access to a number of sites, including government sites,\u201d the Cyber Israel account tweeted.<\/p>\n<p>Haaretz reported the sites for the Israeli departments of interior, health, justice, welfare and even the Prime Minister\u2019s office were taken offline (services are now restored). A source identified by Haaretz as a member of the \u201cdefense establishment\u201d noted the size of the attack, adding that only a nation-state backed threat actor could have pulled off such a large-scale attack.<\/p>\n<p>nternet tracker NetBlocks reported that the attacks were launched against Israeli telecom providers Bezeq and Cellcom.<\/p>\n<div class=\"twitter-tweet twitter-tweet-rendered\"><iframe id=\"twitter-widget-1\" class=\"\" title=\"Twitter Tweet\" src=\"https:\/\/platform.twitter.com\/embed\/Tweet.html?creatorScreenName=threatpost&amp;dnt=true&amp;embedId=twitter-widget-1&amp;features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NrZWxldG9uX2xvYWRpbmdfMTMzOTgiOnsiYnVja2V0IjoiY3RhIiwidmVyc2lvbiI6bnVsbH0sInRmd19zcGFjZV9jYXJkIjp7ImJ1Y2tldCI6Im9mZiIsInZlcnNpb24iOm51bGx9fQ%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1503465330315825152&amp;lang=en&amp;origin=https%3A%2F%2Fthreatpost.com%2Fcyberattacks-israeli-government-sites-largest%2F178927%2F&amp;sessionId=fc1b283e612be6157b648fbd901d24143f15191d&amp;siteScreenName=threatpost&amp;theme=light&amp;widgetsVersion=2582c61%3A1645036219416&amp;width=500px\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-tweet-id=\"1503465330315825152\" data-mce-fragment=\"1\"><\/iframe><\/div>\n<p>&nbsp;<\/p>\n<p>Meanwhile, cybersecurity watchers and experts suspect Iran was behind the attack.<\/p>\n<p>\u201cThe recent DDoS attacks against Israel have been attributed to actors aligned with Iran, highlighting the significant ongoing tensions between the two countries,\u201d Chris Morgan, senior cyber-threat intelligence analyst with Digital Shadows, told Threatpost by email.<\/p>\n<p>He said the timing indicates the DDoS attacks were in retaliation for Israel\u2019s attempt to breach Iran\u2019s nuclear infrastructure, Morgan explained.<\/p>\n<p>\u201cThe attacks occurred just hours after Iranian state television announced that its security forces had reportedly stopped an attempted sabotage of nuclear centrifuges against a nuclear power plant in Fordow,\u201d he said. \u201cAttacking nuclear centrifuges draws parallels to previous cyberattacks against Iran, notably the Stuxnet incident of 2010; some have suggested this destructive malware attack was the work of Israel\u2019s intelligence services.\u201d<\/p>\n<p><strong>Israel, Uniquely Prepared to Defend Against Cyberattacks<\/strong><\/p>\n<p>Israel is known to have engaged in covert cybersecurity operations across the globe. Jennifer Tisdale, CEO of GRIMM, told Threatpost \u2014 including developing the\u00a0<a href=\"https:\/\/threatpost.com\/stuxnet-apts-gossip-girl\/143595\/\" target=\"_blank\" rel=\"noopener\">Stuxnet worm<\/a>\u00a0that was deployed against Iran. As a result the country is prepared to respond to attacks on its own systems, she said, adding that it\u2019s an approach the U.S. government should adopt.<\/p>\n<p>\u201cToday\u2019s broad cyberattack is just another Tuesday in\u00a0Israel, for the most part,\u201d Tisdale said.\u00a0\u201cIsrael\u2019s approach to cybersecurity offers some solid takeaways the U.S. government could and should embrace.\u201d<\/p>\n<p>It starts with smart government policymaking, she added.<\/p>\n<p>\u201cFirst,\u00a0Israel\u00a0has developed cybersecurity public policy that is both robust and nimble,\u201d Tisdale said. \u201cThey have prioritized government funding specific to cyberattack mitigation, preparation and response to protect against other governments or private sector incidents.\u201d<\/p>\n<p>Also, \u201ccybercriminals also face stiff consequences for their actions against Israeli interests,\u201d Tisdale said.<\/p>\n<p>\u201cIsrael has also embraced an attacker-oriented response strategy and has developed a practice for holding people and organizations accountable with both national and international law enforcement,\u201d she added. \u201cThough we could debate what an appropriate response should look and feel like, I believe we can all agree that having a cyber-response plan and accountability plan to protect U.S. critical infrastructure, government networks and communication systems should be prioritized.\u201d<\/p>\n<p>Though the size of the attack is notable, DDoS attacks in general are common against nations and should be anticipated, Netenrich principal threat hunter John Bambenek told Threatpost.<\/p>\n<p>\u201cUltimately, DDoS attacks remain a technique to knock critical infrastructure, such as government websites, offline,\u201d Bambenek said. \u201cThe technique is popular among activists because it doesn\u2019t require much in the way of prep work to pull off. Government targets, such as the Israeli government, are common.\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/threatpost.com\/cyberattacks-israeli-government-sites-largest\/178927\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/threatpost.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los ataques DDoS contra las empresas de telecomunicaciones de Israel derribaron sitios del gobierno, lo que provoc\u00f3 un estado de emergencia temporal. Israel ha desarrollado&hellip; <\/p>\n","protected":false},"author":1,"featured_media":9583,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9582"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9582"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9582\/revisions"}],"predecessor-version":[{"id":9584,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/9582\/revisions\/9584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/9583"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}