• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
palestinian hacktivist group ghostsec compromises 55 berghof plcs across israel

Palestinian Hacktivist Group GhostSec Compromises 55 Berghof PLCs Across Israel

You are here: Home / General Cyber Security News / Palestinian Hacktivist Group GhostSec Compromises 55 Berghof PLCs Across Israel
September 12, 2022

A hacktivist collective called GhostSec has claimed credit for compromising as quite a few as 55 Berghof programmable logic controllers (PLCs) utilised by Israeli organizations as aspect of a “Cost-free Palestine” marketing campaign.

Industrial cybersecurity business OTORIO, which dug further into the incident, said the breach was produced achievable owing to the simple fact that the PLCs were obtainable by the Internet and had been secured by trivially guessable qualifications.

Information of the compromise first came to mild on September 4 after GhostSec shared a online video on its Telegram channel demonstrating a effective login to the PLC’s admin panel, in addition to dumping details from the hacked controllers.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The Israeli business stated the method dumps and screenshots were exported specifically from the admin panel next unauthorized obtain to the controllers via their public IP addresses.

CyberSecurity

GhostSec (aka Ghost Security), first recognized in 2015, is a self-proclaimed vigilante group that was in the beginning shaped to focus on ISIS internet sites that preach Islamic extremism.

Earlier this February, the team rallied its guidance for Ukraine in the fast aftermath of Russia’s military invasion of the state. Considering the fact that late June, it has also participated in a marketing campaign concentrating on Israeli corporations and enterprises.

Palestinian Hacktivist Group GhostSec

“The group pivoted from their typical operations and started to target many Israeli companies, presumably gaining access to several IoT interfaces and ICS/SCADA techniques, which led to doable disruptions,” Cyberint observed on July 14.

The attacks from Israeli targets, dubbed “#OpIsrael,” is said to have commenced on June 28, 2022, citing “steady attacks from Israel toward Palestinians.”

In the intervening period, GhostSec has carried out a range of attacks, together with individuals aimed at internet-exposed interfaces belonging to Bezeq International and an ELNet electricity meter positioned at the Scientific Industries Heart (Matam).

CyberSecurity

The breach of Berghof PLCs, considered in that mild, is component of the actor’s broader shift to strike the SCADA/ICS area, while it appears to be a scenario whereby the group took benefit of “quickly overlooked misconfigurations of industrial units” to have out the attacks.

“Inspite of the minimal effects of this incident, this is a great instance wherever a cyber attack could have easily been averted by easy, good configuration,” the researchers explained.

“Disabling the general public publicity of belongings to the Internet, and maintaining a excellent password plan, primarily switching the default login qualifications, would cause the hacktivists’ breach endeavor to fail.”

GhostSec, in the meanwhile, has continued to post a lot more screenshots, declaring to have received obtain to a different manage panel that can be utilised to alter chlorine and pH levels in the water.

“Hope you all can understand our final decision on not attacking their pH concentrations and risking a prospect to hurt the innocents of #Israel,” the group explained in a tweet posted more than the weekend. “Our’ war’ has often been FOR the people not versus them. #FreePalestine”

Found this posting fascinating? Abide by THN on Facebook, Twitter  and LinkedIn to study more special material we post.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «why vulnerability scanning is critical for soc 2 Why Vulnerability Scanning is Critical for SOC 2
Next Post: Iranian Ministry of Intelligence sanctioned after Albania cyber attack iranian ministry of intelligence sanctioned after albania cyber attack»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.