But beyond the visceral violence lies a hidden layer of the war – an online conflict. We are scholarsofcyberwarfare who have cataloged and analyzed the various cyber operations conducted during the war by Hamas, Israel and other nations and hacking groups supporting one side or the other. The data paints a picture of an unseen facet of the conflict, and it offers insights about the nature of cyber conflict more broadly.
The main conclusion we’ve drawn is that the consequences of cyber conflict are primarily felt by civilians, not the soldiers or militants actively engaged in the fighting. We find that the damage cyberattacks inflict on digital systems is far less significant than the resulting harm to humans, and the resulting upward spiral of violence.
Hamas’ cyberwarfare activities
The cyberattacks hitting Israeli government and civilian systems have had mixed effects. Some technically simple attacks succeeded in obtaining crucial intelligence that assisted Hamas fighters’ incursion into Israel. Other attacks employed a scattershot approach, targeting anything within digital reach – hospitals, universities, banks and newspapers. These attacks didn’t serve any military purpose, but simply aimed to disrupt Israeli life and terrorize the public.
Before the deadly Oct. 7, 2023 terror attack on Israel that sparked the current war, Hamas cyber operatives were working to support the attack planning. A Hamas hacking unit called Gaza Cybergang spied on Israel in search of sensitive information about Israeli military installations. The information they gleaned was instrumental during the attack.
Hamas hackers also conducted phishing attacks, relatively simple attacks in which fake email or text messages resemble legitimate ones and encourage a user to either reply with sensitive information or click on a link that downloads malicious software to their computer or mobile phone.
As the Oct. 7 attack unfolded, the pro-Palestinian hacktivist group AnonGhost released a mobile app with the same name as a prominent reputable app that gives Israeli citizens warnings about impending attacks from Hamas into Israel. AnonGhost issued false alerts – including, reportedly, one about a nuclear attack – and collected users’ data, including their contacts, call logs and text messages.
However, since full-fledged hostilities erupted, Hamas has been largely unable to carry out effective cyberattacks that aid its war efforts. As a result, the group turned to information warfare, seeking to evoke panic and shift public opinion.
The most common type of attack that Hamas’ cyberwarriors and their allies use now is a distributed denial-of-service, when a barrage of nonsense internet traffic is aimed at one or more websites, email servers or other internet-connected systems. They get overwhelmed by the nonsense traffic and either shut down or cease to function properly.
Denial-of-service attacks have hit websites for news media outlets, banks, financial institutions and government agencies. One attack took the Jerusalem Post website offline for two days. The group that claimed responsibility for that attack was a religious hacktivist group called Anonymous Sudan, with known connections to Russian hacking groups.
Hamas and its online allies are also using wiper malware, which infects a computer and destroys its data. This kind of attack does not serve a purpose such as extortion or surveillance – it just aims to destroy everything in its wake.
We also recorded several attacks that infiltrated databases and released their contents, such as one where the private data of students at Ono Academic College was published online.
Another series of attacks took control of digital billboards to display the Palestinian flag in sites around Israel, along with false news about military defeats. These attacks are part of a broader misinformation effort designed to shape domestic debate and terrorize Israeli civilians.
But beyond the visceral violence lies a hidden layer of the war – an online conflict. We are scholarsofcyberwarfare who have cataloged and analyzed the various cyber operations conducted during the war by Hamas, Israel and other nations and hacking groups supporting one side or the other. The data paints a picture of an unseen facet of the conflict, and it offers insights about the nature of cyber conflict more broadly.
The main conclusion we’ve drawn is that the consequences of cyber conflict are primarily felt by civilians, not the soldiers or militants actively engaged in the fighting. We find that the damage cyberattacks inflict on digital systems is far less significant than the resulting harm to humans, and the resulting upward spiral of violence.
Hamas’ cyberwarfare activities
The cyberattacks hitting Israeli government and civilian systems have had mixed effects. Some technically simple attacks succeeded in obtaining crucial intelligence that assisted Hamas fighters’ incursion into Israel. Other attacks employed a scattershot approach, targeting anything within digital reach – hospitals, universities, banks and newspapers. These attacks didn’t serve any military purpose, but simply aimed to disrupt Israeli life and terrorize the public.
CNN's Erin Burnett speaks with Rudy Giuliani's daughter, Caroline Rose Giuliani, about why she chose to endorse Vice President Kamala Harris for president, despite her father's active support of former President Donald Trump.