Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Zenger
Zenger
World
Lennox Kalifungwa

Israel Exposes Iranian Phishing Campaign Targeting Israeli Officials

Cyber attack, Digital background green matrix Vector Illustration. Israeli Citizens' awareness and vigilance along with additional actions by the Shin Bet and the Israeli security system, thwarted the Iranian attempts to obtain data falsely. TPS.

Israel exposed an Iranian phishing campaign aimed at gathering information about Israeli policies and citizens, the Israel Security Agency (Shin Bet) announced on Sunday.

“The Iranian campaign primarily targeted Israeli civil servants and researchers at various research institutes and had been going on for several months,” said the Shin Bet.

Fake profiles were employed impersonating Israelis whom would-be victims had been in contact with for professional or personal reasons. The Iranians would make initial contact through a phony LinkedIn profile, then later shift the conversation to email.

Eventually, the Israeli targets would receive an attached file in the guise of an invitation to a conference or an article or study of interest. Opening the file would introduce malicious software that would give the Iranian contact access to the rest of the target’s computer.

The Iranian entity’s appeals were based on information collected about the Israeli targets from social networks and the internet, and the contents of the correspondence and the connection were appropriate to their occupation and interests.

Israel’s Sorek Desalination Plant on Nov. 22, 2018. Iranian hackers are believed responsible for trying to poison Israel’s water system in 2020, ISAAC HARARI/FLASH90.

“The awareness and vigilance of the citizens they turned to, along with additional actions by the Shin Bet and the Israeli security system, thwarted the Iranian attempts to achieve their goal,” said the Shin Bet.

The statement did not indicate how many Israelis were contacted or had downloaded the malware.

Israel and Iran have been engaged in years of clandestine cyberwarfare.

Iranian hackers are believed responsible for trying to poison Israel’s water system in 2020, encrypting data at Hillel Yaffe Medical Center in Hadera and demanding a ransom in 2021, and triggering false rocket sirns in 2022.

The major Iranian port of Bandar Abbas was paralyzed for days when computers coordinating the arrival and departure of ships, trains and trucks crashed in 2020. The attack took place shortly after the attack on Israel’s water system and has been widely attributed to Israel.

Israel’s defense establishment views the attack, which follows a recent sharp spike in cyber attacks on strategic targets in the country by foreign parties, as a significant event.

Produced in association with Jewish News Syndicate

Edited by Judy J. Rotich and Newsdesk Manager

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.