Hacktavist Attacks Hacktivist Attacks Show Ease of Hacking Industrial Control Systems https://www.securityweek.com/hacktivist-attacks-show-ease-hacking-industrial-control-systems An ongoing problem since 2016 and reported especially 2020 and September 2022, pro-Palestine hacktivist group named GhostSec and a group named Gonjeshke Darande along with...
Introduction Sometimes we have to write on topics that are super complicated. The Israeli War on Hamas is one of those times. It’s a challenge because the two sides in the conflict both have their grievances, and a lot of spin and misinformation gets put out there to confuse...
Hacktavist Attacks
“Hacktivist Attacks Show Ease of Hacking Industrial Control Systems”
https://www.securityweek.com/hacktivist-attacks-show-ease-hacking-industrial-control-systems
An ongoing problem since 2016 and reported especially 2020 and September 2022, pro-Palestine hacktivist group named GhostSec and a group named ‘Gonjeshke Darande’ along with others hacked state infrastructure with moderate cyber sophistication, focusing on unprotected ICS or IoT devices that are exposed to the internet. They typically rely on open ports, publicly available tools, and they typically operate for short periods of time to achieve a specific goal. They have attacked infrastructure in Israel and Iran and elsewhere in order to protest against state aggression committed by Israel, Iran or other state targets. This is important because they cause mainly localized disruption and other effects that can also lead to major consequences jeopardizing public safety. One possible solution is for states to perform cyber assessments: these attacks can be easily mitigated by securing internet access, hardening authentication mechanisms, performing basic ICS security monitoring by a chosen MSSP, and enforcing basic cyber security hygiene.
Legend: Who, What, When, Where, Why, How, So What?!, possible Solution
Who: pro-Palestine hacktivist group named GhostSec; a group named ‘Gonjeshke Darande’ and others; in short, hacktavists all over
What: ‘hacked’ state infrastructure: 55 Berghof programmable logic controllers (PLCs) located in Israel; causing disruptions in Iran, including forcing a steel company to halt production and paralyzed gas stations across the country
When: ongoing, reports noted in2016, 2020-2022
Where: state infrastructure in Israel and Iran, etc.
Why: response to state aggression by pro-Palestine and pro-Israel hactavists
How: moderate cyber sophistication, focusing on unprotected ICS or IoT devices that are exposed to the internet. They typically rely on open ports, publicly available tools, and they typically operate for short periods of time to achieve a specific goal.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.