kayhan.ir

News ID: 103959
Publish Date : 21 June 2022 - 21:28
A A

BEIRUT (Dispatches) -- A suspected cyberattack has caused missile attack sirens to sound in two cities in Occupied Palestine, the Zionist regime’s media reports say.
They said missile attack warning sirens were activated in Al-Quds and Eilat on Saturday evening, and rang for almost an hour. Israeli military authorities scrambled to reassure that the sirens were a false alarm, which they attributed to a “malfunction”.
On Monday, however, the Zionist regime’s Army Radio said the occupying regime’s cyber directorate (INCD) suspects that a cyberattack was “behind a system malfunction.”
According to the INCD, the attack was directed against the municipality’s siren systems and by accessing the alert system, the hackers were able to activate the sirens.
The INCD did not specify who was suspected of having carried out the hack, but the Army Radio quoted a former official as accusing Iran of the cyberattack.
The number of alleged cyberattacks against the occupying regime has been mounting over the past months.
On Wednesday, a hacker group identifying itself as the “Moses Staff” broke into the Israeli electricity network, vowing to plunge the regime into darkness.
The group said it had targeted the Israel electric corporation, the largest supplier of electrical power in the occupied territories, as well as Dorad energy ltd., which serves customers throughout the territories, and technical solutions provider, Reali technologies ltd.
Earlier this year, the group struck Israel’s closed-circuit television cameras in the occupied Palestinian territories and Rafael advanced defense systems, an Israeli military technology company. Back then, it posted a message regarding the cyberattack on its website, titled “We see with your eyes.”
Last November, Moses Staff said it had successfully conducted a massive cyberattack against the occupying regime, breaking into the servers of major companies, and adding that it was now in possession of comprehensive data that could be leaked.
According to Moses Staff’s website, the group has so far hacked scores of servers and hundreds of websites and compiled dozens terabytes of data.
On Tuesday, the Middle East Eye online news outlet reported that running app Strava has been used to spy on members of the Israeli military by tracking their movements across secret bases around the occupied territories.
According to Haaretz, roughly 100 Zionist army officers or military officials’ details, including names, photos and movements, were available to outsiders.
Users could place fake running “segments” inside military bases and monitor individuals exercising on the grounds, including those with the most robust privacy settings.
The app also revealed the locations of susceptible sites in Occupied Palestine, including army and air force bases, Mossad headquarters and military intelligence bases.

The app’s tracking tools allow anyone to define and compete over “segments”, which are short sections of a run or a bike ride that can be traced over. 
Users can then select a segment after uploading it from the app or through GPS recordings from other products - however, Strava has no way of tracking whether the GPS is legitimate. 
The loophole that was discovered by the Israeli open-source group FakeReporter found that a user took advantage of the glitch and created a database of military bases. 
In 2018, Strava published a “heatmap” which showed the paths of its user log, but through that, the map also showed U.S. military bases in countries including Syria and Afghanistan.
 
Name:
Email:
* Comment: