As part of its ongoing operation towards Israeli organizations, hacktivist group Nameless Sudan has added the Israel Postal Firm as its newest sufferer.
Whereas the Israel Postal Firm cyber assault is but to be confirmed, the official web site was accessible on the time of writing.
The hacker group final month triggered a mass power disruption throughout Israel and shortly leaked data belonging to the citizens of the nation.
OpIsrael: Nameless Sudan and hacker teams focusing on Israel
Apart from the Israel Postal Company cyber attack, one other group of hackers, who name themselves ‘Sharp Boys’, claimed to promote the non-public information of practically 500,000 students in Israel.
The info, which was allegedly stolen from the servers of the Atid group, a school chain from Israel, included names, identification playing cards, addresses, navy information, and extra particulars of the scholars.
Responding to the info breach, the Atid group mentioned, “People from hostile international locations tried to hold out strategic assaults on the main instructional establishments in Israel….,” said a Middle East Monitor report.
“We thwarted the try, and so far as we all know, little information was leaked,” the group additional added. Atid Group held Iranian hackers liable for the cyber assaults they suffered that strategically focused Israel’s educational establishments.
Nevertheless, researchers are suspicious about it being an Iranian group.
In April, the Nameless Sudan group additionally claimed cyber assaults on fifteen Israeli websites together with the Israeli Broadcasting Authority (Kan).
Media stories in regards to the cyberattack on Israeli Prime Minister Benjamin Netanyahu’s Fb account additionally surfaced in April.
Israel, in line with a report, suffered 18% lesser cyberattacks in 2022 as compared with 2021. Nevertheless, this 12 months, their intelligence agency Mossad amongst others was left inaccessible with DDoS attacks by Nameless Sudan.
Final month, Nameless Sudan disrupted the website of Israel intelligence company Mossad with a Distributed Denial of Service (DDoS) assault. Days earlier than it, the menace group took down the web sites of main Israeli media shops together with The Jerusalem Post.
About 31% of the cyber assaults in 2022 had been launched by utilizing phishing emails, social community was focused in 26% of all assaults on Israel.
Nameless Sudan Targets UAE
Within the message addressed to the United Arab Emirates, the hacktivist group accused the UAE of normalizing its ties with the Zionist regime which the group called prison.
“We’ll assault you due to your actions and hurt you’ve introduced upon the middle east especially Sudan. You may have supported fast help forces in all methods doable and have all the time been funding rebels in a number of international locations within the center east like Yemen, Libya, ” said a video message by the group tweeted by Hacker News Ar.
The group concluded the message by threatening to focus on the UAE in the identical method as they focused Israel. The hacktivist group expressed solidarity with Muslims and Arabs.
The Cyber Categorical has been reporting on the constant assaults by Nameless Sudan on Israel and India, each of which have not too long ago established pleasant relations with Russia. This makes it difficult to find out the group’s true intentions and determine any patterns of their assaults.
Detecting any patterns of their assaults and uncovering the true intentions of the group has develop into more and more troublesome.
Regardless of claiming to launch DDoS assaults on Swedish, Dutch, Australian, and German corporations in retaliation for anti-Muslim actions, additional investigation has revealed hidden connections that indicate a different motive.
Upon investigation, the Trustwave SpiderLabs analysis staff has concluded that Nameless Sudan is probably going a sub-group of Killnet, a Professional-Russian menace actor group with whom they freely affiliate.
Media Disclaimer: This report relies on inner and exterior analysis obtained via varied means. The data supplied is for reference functions solely, and customers bear full duty for his or her reliance on it. The Cyber Categorical assumes no legal responsibility for the accuracy or penalties of utilizing this info.
Associated
!function(f,b,e,v,n,t,s) {if(f.fbq)return;n=f.fbq=function(){n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)}; if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0'; n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;s=b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t,s)}(window, document,'script', 'https://connect.facebook.net/en_US/fbevents.js'); fbq('init', '5969393309772353'); fbq('track', 'PageView');
(function(c,l,a,r,i,t,y))(window, document, "clarity", "script", "f1dqrc05x2");