Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Deepika Padukone and Hrithik Roshan’s fight posters provoke reactions from Ranveer Singh, Saba Azad and Arslan Goni | spcilvly

    December 5, 2023

    ‘Amphibious creature’: Anand Mahindra shares video of Thar wading through flooded road in Chennai. See | Current news | spcilvly

    December 5, 2023

    What might be your warning signs in a relationship based on your sun sign? | Astrology | spcilvly

    December 5, 2023
    Facebook X (Twitter) Instagram YouTube Telegram
    Tuesday, December 5
    Facebook X (Twitter) Instagram YouTube Telegram
    SPCILVLY
    • Home
    • Roadmap
    • World News
    • Sports
    • News
    Login
    SPCILVLY
    Home»News»Investigators discovered the hacking of a power plant in Israel | spcilvly
    News

    Investigators discovered the hacking of a power plant in Israel | spcilvly

    HarshBy HarshOctober 17, 2023No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    In the ongoing conflict between Israel and Palestine, there has been a notable rise in hacktivist groups that are planning an endless attack against a variety of targets on both sides of the conflict.

    On October 8, the Cyber ​​Av3ngers group revealed a major attack on the private Israeli Dorad power plant. The organization posted images of the supposedly hacked site and a logo that used the colors of the Palestinian flag and political sentiments, implying that the hack was in favor.

    To support their claim that the Dorad website was the victim of a DoS attack, the hackers also provided evidence of their DDoS success.

    Kaspersky examined the information published by Cyber ​​Av3ngers and found that it derived from previous revelations by Moses Staff, another hacktivist collective.

    Document

    Free Trial

    Implementing “Trustifi” AI-powered email security solutions can protect your business from today’s most dangerous email threats such as tracking, blocking, modification, phishing, account takeover, business email compromise, malware and ransomware.

    Who are Cyber ​​Av3ngers?

    The “Cyber ​​Avengers” threat actor is a group with a similar name that has been operating since at least 2020. There is not much evidence that the Cyber ​​Avengers are related to the Cyber ​​Aveng3rs or the Cyber Av3ngers.

    They primarily target Israeli organizations, particularly those that maintain the nation’s vital infrastructure.

    A new Telegram channel called @CyberAveng3rs was launched on September 15, 2023. The channel first published statements connecting its owners to previous actions taken by “Cyber ​​Avengers.” He then added messages outlining his plans to attack key Israeli infrastructure, such as water and electricity systems.

    The most recent post on the channel discussed a security guideline that the Israeli government had developed and published for infrastructure security. The Cyber ​​Avengers team issued the instructions and target list in mockery. Eight companies have been included on the list.

    Attack on private Dorad power plant

    The file, which contained information stolen from several Israeli companies, was originally published by Moses Staff in June 2022. 11 files that were part of the attack on the private Dorad power plant have timestamps from August 2020, but the time stamps The compression time frames are dated June 14. , 2022.

    The file data included PNG and JPEG images as well as PDF documents. Along with the data disclosure, the attackers also released a video.

    In particular, when researchers compare the originals from the Moses Staff archive with the images released by Cyber ​​Av3ngers, it has been observed that Cyber ​​Av3ngers captured images of the video and PDF files that were leaked by Moses Staff. Additionally, Cyber ​​Av3ngers cropped the images and added a logo image before posting them.

    Overall, it appears that Moses Staff’s hacking activities led to the data leak. The files appear to have been deleted from computers belonging to the targeted company using malware, and this threat actor carried out these actions using specialized tools such as PyDCrypt, DCSrv, and StrifeWater.

    Reports say that there is usually no way to pay the ransom and decrypt the data because the Moses Staff organization is not interested in making money and instead intends to do harm.

    Last words

    “The alleged Cyber ​​Av3ngers hack is recycled or repurposed from a previous security breach and is not the result of any new unauthorized access to data,” the researchers said.

    This therefore highlights the importance of robust cybersecurity measures to protect against new and ongoing threats to IT and OT systems.

    Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the Free Trial to guarantee 100% security.


    Related

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThis IRS Auditor Secretly Turned $5,000 Savings Into a $22 Million Fortune: Here Are the 3 Simple Strategies That Made Anne Scheiber Rich | spcilvly
    Next Article Locking financial and accounting data: the best data security strategies | spcilvly
    Harsh
    • Website
    • Instagram

    Harsh is a versatile author sharing in-depth tutorials on web development, AI, and ethical h4king. Unlock new possibilities and expand your knowledge with Harsh's empowering content.

    Related Posts

    News

    ‘Amphibious creature’: Anand Mahindra shares video of Thar wading through flooded road in Chennai. See | Current news | spcilvly

    December 5, 2023
    News

    Türkiye’s great warning to Israel; ‘Serious consequences if Hamas is persecuted in Ankara’ | spcilvly

    December 5, 2023
    News

    Pakistan to receive another package from IMF after Standby agreement | spcilvly

    December 5, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Support Us

    Deepika Padukone and Hrithik Roshan’s fight posters provoke reactions from Ranveer Singh, Saba Azad and Arslan Goni | spcilvly

    December 5, 2023

    ‘Amphibious creature’: Anand Mahindra shares video of Thar wading through flooded road in Chennai. See | Current news | spcilvly

    December 5, 2023

    What might be your warning signs in a relationship based on your sun sign? | Astrology | spcilvly

    December 5, 2023

    Shaily Sanghvi’s Rise in Hollywood: A Filmmaker’s Extraordinary Journey | spcilvly

    December 5, 2023

    Four men from Punjab wanted in Canada for aggravated assault | spcilvly

    December 5, 2023

    Lokayukta attacks 63 places in Karnataka; ₹6 lakh cash, valuables seized | Bengaluru | spcilvly

    December 5, 2023
    ABOUT US

    This is the spcilvly blog. Here, you will find articles discussing various topics related to ethical h4king and cyber security. Our goal is to provide helpful resources and advice for beginners and experienced h4kers alike.

    RECENT POST
    • Deepika Padukone and Hrithik Roshan’s fight posters provoke reactions from Ranveer Singh, Saba Azad and Arslan Goni | spcilvly
    • ‘Amphibious creature’: Anand Mahindra shares video of Thar wading through flooded road in Chennai. See | Current news | spcilvly
    • What might be your warning signs in a relationship based on your sun sign? | Astrology | spcilvly
    • Shaily Sanghvi’s Rise in Hollywood: A Filmmaker’s Extraordinary Journey | spcilvly
    • Four men from Punjab wanted in Canada for aggravated assault | spcilvly
    IMPORTANT PAGE
    • About US
    • Terms and Condation
    • Disclamer
    • Privacy Policy
    • Write For Us
    Facebook X (Twitter) Instagram YouTube Telegram
    • Home
    © 2023 spcilvly, Designed by Harsh.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.

    Sign In or Register

    Welcome Back!

    Login to your account below.

    Lost password?