Yemen News Agency (SABA)
Home      Revolution Leader   About President   Local   International   US-Saudi Aggression   Economy   Reports   development and community initiatives  
فارسي | Español | Deutsch | Français | عـربي | RSS Feed
Search | Advance Search
 
  Local
Al-Houthi responds to US Central Command's threats: "Yemenis are sea's masters"
[23 December 2024]
Dhamar University Faculty of Medicine organizes introduction to electronic cochlear implant program
[23 December 2024]
Field visit to follow up on implementation of community initiatives in Al-Hodeida
[23 December 2024]
Workflow at Awqaf Office of Sana'a Governorate
[23 December 2024]
Customs Authority supports Joud al-Rahman Orphan Care Foundation
[23 December 2024]
 
  International
Sheikh Sabri: "Jewish holidays show their hidden ambitions towards Al-Aqsa"
[23 December 2024]
Hamas: "We warn against the rhetoric of regional mobilization & its effects on national fabric"
[23 December 2024]
Chinese defense condemns US arms sales to Taiwan
[23 December 2024]
Palestinian woman injured by bullets during enemy forces storming in Husan village
[23 December 2024]
Two martyrs & injuries when enemy targeted group of citizens in Taybeh, south Lebanon
[23 December 2024]
 
  Reports
Yemen & legend deterrence that defeated American project
[23 December 2024]
Training 1,400 farmers in Dhamar across various agricultural sectors: Report
[22 December 2024]
Yemen's weekly flood of support for Palestinian cause
[21 December 2024]
Saudi Arabia Approaches Normalization with Zionist Enemy
[21 December 2024]
Million-Man March in Capital, Governorates: A Challenge to Enemy, Confirmation that Yemen Will Remain Strongest Support Front for Palestine
[21 December 2024]
 
  US-Saudi Aggression
US-British aggression on capital Sana'a
[22 December 2024]
US-British aggression on Hodeida
[22 December 2024]
US aggression targets Al-Ardi complex in Sana'a
[17 December 2024]
US-British aggression aircraft launch raid on Hajjah
[16 December 2024]
US-British aggression targets capital Sana'a
[09 November 2024]
  Reports
Zionist admission Hamas hacked soldiers ' phones over two years with cyber attack: Report
Zionist admission Hamas hacked soldiers ' phones over two years with cyber attack: Report
Zionist admission Hamas hacked soldiers ' phones over two years with cyber attack: Report
[Tue, 05 Nov 2024 17:46:52 +0300]

Sana'a - Saba:

The army of the Zionist enemy acknowledged in a report published on Tuesday that the Islamic resistance movement Hamas "targeted Zionist soldiers with a cyber attack for two years" before "Al-Aqsa flood" attack on the seventh of October 2023.

According to the media of the Zionist enemy, the occupation army confirmed in its report that "Hamas movement hacked through the cyber attack phones of soldiers, and collected sensitive information. "The collection of information benefited Hamas in carrying out the attack of the seventh of October," he said.

An investigation by the army of the Zionist enemy revealed a possible penetration by Hamas of surveillance cameras in army camps.. At the same time, he pointed out that soldiers posted photos from inside the camps.

The report of the enemy army recommended a radical change in the basics of maintaining information security in the camps.

Zionist experts stressed that "Hamas has qualitative intelligence capabilities, but Israel was underestimating them, until the seventh of October," he said.

The Zionist newspaper Yedioth Ahronoth said that "Hamas has accumulated it since before the attack of the seventh of last October".

Yossi Yehoshua, the newspaper's military affairs analyst, said that al-Qassam Brigades had documents detailing the structure of the Paratroopers Brigade in the Zionist "army", as well as its social structure, in addition to photos of the former brigade commander and other officers who had recently completed their service.

Earlier, a report by the American newspaper "New York Times" revealed that video footage taken from cameras installed on the heads of Hamas operatives who were martyred in "Al-Aqsa flood" attack showed that they knew a lot of information and secrets about the Zionist army and its weaknesses. It indicated that the attackers were able to access the server room at one of the Zionist army centers through what they had information.

The footage provided"horrifying" details of how al-Qassam Brigades managed to surprise one of the most powerful armies in the Middle East, according to its description.

The "New York Times" had revealed in the second week of al-Aqsa flood in October 2023, citing Zionist sources, that the elite fighters of al-Qassam Brigades had not only sufficient weapons, but detailed plans related to the work of each group, detailed information on the weaknesses of the enemy army and Zionist military secrets.

A senior Zionist military official told The New York Times that the elite fighters of al-Qassam knew exactly where the communication servers were located at some military bases, and destroyed them, in a way that made it very difficult to determine the extent of the penetration and request help, and the soldiers, who were stationed there failed to protect the settlers.

The American newspaper pointed out that one of the bases reached by the elite is a secret intelligence base whose location is known only to those who work in it, and al-Qassam forces reached it through a dirt road, and it turned out that they had full information about it, and stormed it in the early hours of the flood.

Analysts confirmed that Hamas has a cyber warfare strategy that it started a decade ago, and is still developing rapidly, as warned by author Simon B. handler in a report prepared for the cyber state management unit of the Atlantic Council-a member of the Digital Forensics Research Laboratory - published at the end of 2022.

The martyr Izz al-Din al-Qassam Brigades-the military wing of the Islamic resistance movement Hamas-succeeded in surprising the Zionist entity by land, sea and air, and its Resisters infiltrated several settlements in the Gaza Strip, which led to the death of hundreds of Zionists among soldiers and settlers, and the capture and loss of more than 200 others.

It is noteworthy that the first cyber attack of the martyr Izz al-Din al-Qassam Brigades came during what it called the "operation "Hajarat al-Sijil" (Pillars of Cloud) battle " in response to the Zionist aggression in 2012, and succeeded in hacking more than five thousand mobile phones of officers and soldiers in the army of the Zionist enemy, and this formed the "first nucleus" of the electronic unit surrounded by great secrecy.

At that time, this attack, which was accompanied by the hacking of a Zionist television channel and the broadcasting of threatening messages in Hebrew, was an important turning point, and according to a security source in the resistance, it introduced it, and al-Qassam Brigades in the forefront, the field of "cyber warfare", which falls within the framework of the growing "conflict of brains", and it achieved tangible successes, despite the weak capabilities compared to the enormous technical progress enjoyed by the occupation entity.

The establishment of this unit and the development of its work are attributed to the martyr Jumaa al-Tahla, who was assassinated by the Zionist enemy during the "Sword of al-Quds" battle in May 2021, and it was announced at the time that he was the leader of cybersecurity in Hamas, and that the goal was to undermine its capabilities in electronic attacks.

The establishment of this unit also came to organize the technical attacks of the resistance, and to increase their development, especially in the use of information, whether in terms of field offensive operations or to thwart the occupation's operations.

In 2022, the Zionist "Kan" channel revealed details of a serious security case in which three Palestinians from inside the country are accused of leaking sensitive information about the Cellcom company to Hamas.

The Zionist channel reported that the Palestinians were able to conduct an actual experiment during one of the rounds of war to test whether they could disrupt the infrastructure of the cellular communications company or not.

The channel quoted an informed source as saying: "We were on the verge of disaster, and as a result, senior employees in the Zionist communications companies will be subjected to a security check following this espionage case."

In 2020, the Zionist enemy army announced that the Information Security Department of the so-called "Intelligence Authority" had monitored repeated attempts by Hamas to hack the mobile phones of Zionist soldiers. The hacking attempts relied on communicating with them via social media, and trying to lure them into downloading malicious applications.

According to a statement by the Zionist enemy army, the army, in cooperation with the so-called "General Security Service", thwarted a successful technological attack on Hamas's server networks, which served it with the aim of communicating and collecting information from soldiers. This is the first time a technological attack of this kind has been thwarted.

Following this step, the Zionist enemy decided to summon hundreds of soldiers whose phones had been hacked, with the aim of questioning and removing the danger from the device. He pointed out that this time Hamas expanded its capabilities and began targeting other segments, unlike previous times when it focused on fighters.

In its recent attempts, the movement also used new social media, as for the first time Hamas exploited the Telegram application to talk to soldiers (in addition to the well-known applications: Facebook, WhatsApp, and Instagram).

In 2017, the Zionist enemy intelligence revealed a large-scale espionage operation carried out by Hamas against dozens of Zionist soldiers by using fake accounts on the social networking site Facebook.

The enemy media reported that Hamas was able to hack dozens of accounts of dozens of soldiers by hacking their cell phones, and the enemy intelligence believes that Hamas was indeed able to obtain sensitive and dangerous information from within the devices of a number of officers in the occupation army.

Between 2016 and 2018, al-Qassam Brigades carried out one of its most important security operations, which it called "Mirage", and succeeded in a tight penetration of the Zionist intelligence apparatus, and thwarted its attempt to recruit an agent to spy and confuse the resistance's missile and security system.

With the development of methods and the emergence of social media platforms and mobile phone applications in the late first decade of the millennium, new and advanced methods emerged for Hamas that depend more on specific, studied goals.

The Jerusalem (al-Quds) Institute for Strategic Studies, affiliated with the Zionist enemy, confirms that during Operation "Cast Lead" - which the Palestinian resistance calls "the Battle of Furqan" - in 2012, Hamas attacked Zionist websites, including the website of the Home Front Command and the website of the spokesman for the occupation army. At the time, the movement's spokesman, Sami Abu Zuhri, announced that cyber attacks are an integral part of the war on "Israel".

A report by American Express states that in 2013, a group calling itself "Izz ad-Din al-Qassam Cyber Hackers" carried out what is known as a "DDOS Attack" on the "American Express" website, which lasted two hours.

In contrast to a traditional DDoS attack, which relies on a network of compromised computers that are joined together to form a botnet controlled by the hackers, the Palestinian attack used a programming language that runs on the network of compromised servers, allowing the hackers to obtain greater bandwidth to carry out the attack. According to a report by the Jerusalem Institute for Strategic Studies, in the summer of 2014, during the Zionist Operation Protective Edge - to which Hamas responded with Operation Protective Edge - attempts to attack civilian and military sites in the Zionist entity increased.






Whatsapp
Telegram
Print

  more of (Reports)
UPDATED ON :Tue, 24 Dec 2024 00:04:05 +0300