Skip To Content
JEWISH. INDEPENDENT. NONPROFIT.
Breaking News

Fifteen Israeli Defense Computers Hacked by Email Virus

Hackers broke into an Israeli defence ministry computer via an email attachment tainted with malicious software that looked like it had been sent by the country’s Shin Bet secret security service, an Israeli cyber security firm said on Sunday.

Aviv Raff, chief technology officer at Seculert, said the hackers earlier this month temporarily took over 15 computers, one of them belonging to Israel’s Civil Administration that monitors Palestinians in Israeli-occupied territory.

Raff told Reuters that Palestinians were suspected to be behind the cyber attack, citing similarities to a cyber assault on Israeli computers waged more than a year ago from a server in the Hamas-ruled Gaza Strip.

While the latest attack was conducted from a server in the United States, experts noticed writing and composition similarities with the earlier attack, he said.

Israeli officials declined to comment on Raff’s findings. “We are not commenting on it, we don’t respond to such reports,” said one of the officials, Guy Inbar, a spokesman for the Civil Administration.

There was no immediate Palestinian comment on the report.

Securlet had not determined what the hackers did after the initial infection with “Xtreme RAT” software, Raff said. “All we know is at least one computer at the Civil Administration was in control of the attackers; what they did we don’t know.”

The Civil Administration is a unit of Israel’s defence ministry that oversees the passage of goods between Israel and the West Bank and Gaza Strip, territories Israel captured in a 1967 war and which Palestinians want for a state.

The administration also issues entry permits to Palestinians who work in Israel.

DEFENCE CONTRACTORS ALSO HACKED?

Raff declined to identify the other 14 computers targeted by the hackers. An Israeli source who spoke on condition of anonymity said these included companies involved in supplying Israeli defence infrastructure.

Based on Raff’s analysis the 15 computers were in the hackers’ grip for at least several days after the Jan. 15 dispatch of the email, which included an attachment about ex- Israeli prime minister Ariel Sharon who had just died.

Hacking activity has surged in the Middle East over the past three years as both governments and activist groups have targeted the military, other state agencies, critical infrastructure, businesses as well as dissidents and criminal groups in order to gain information about their operations and also disrupt them.

The email that burrowed into the Israeli defence ministry computer looked like it had been sent from the Shin Bet security service, Raff said.

Raff’s firm was able to “sinkhole” the operation, tricking the Xtreme RAT software into communicating with servers that Seculert controlled in order to figure out which computers were infected and to deactivate the attack.

Xtreme RAT is a remote access trojan, which gives hackers complete control of an infected machine. They can steal information, load additional malicious software onto the network or use the compromised computer as a beachhead from which to conduct reconnaissance and attempt to gain deeper access into the network, Raff said.

Word of the cyber attack came a day before a three-day Israeli cybertech conference being held in Jerusalem, and just after Prime Minister Benjamin Netanyahu plugged Israeli technological advances at the World Economic Forum in Davos.

Raff denied there was any irony in the timing of his warning so soon after Netanyahu’s remarks. “Unfortunately there is no such thing as 100 percent safety either when it comes to physical risks or information security,” he said.

I hope you appreciated this article. Before you go, I’d like to ask you to please support the Forward’s award-winning journalism this Passover.

In this age of misinformation, our work is needed like never before. We report on the news that matters most to American Jews, driven by truth, not ideology.

At a time when newsrooms are closing or cutting back, the Forward has removed its paywall. That means for the first time in our 126-year history, Forward journalism is free to everyone, everywhere. With an ongoing war, rising antisemitism, and a flood of disinformation that may affect the upcoming election, we believe that free and open access to Jewish journalism is imperative.

Readers like you make it all possible. Right now, we’re in the middle of our Passover Pledge Drive and we still need 300 people to step up and make a gift to sustain our trustworthy, independent journalism.

Make a gift of any size and become a Forward member today. You’ll support our mission to tell the American Jewish story fully and fairly. 

— Rachel Fishman Feddersen, Publisher and CEO

Join our mission to tell the Jewish story fully and fairly.

Only 300 more gifts needed by April 30

Republish This Story

Please read before republishing

We’re happy to make this story available to republish for free, unless it originated with JTA, Haaretz or another publication (as indicated on the article) and as long as you follow our guidelines. You must credit the Forward, retain our pixel and preserve our canonical link in Google search.  See our full guidelines for more information, and this guide for detail about canonical URLs.

To republish, copy the HTML by clicking on the yellow button to the right; it includes our tracking pixel, all paragraph styles and hyperlinks, the author byline and credit to the Forward. It does not include images; to avoid copyright violations, you must add them manually, following our guidelines. Please email us at [email protected], subject line “republish,” with any questions or to let us know what stories you’re picking up.

We don't support Internet Explorer

Please use Chrome, Safari, Firefox, or Edge to view this site.