Middle East

Israeli government websites crash in cyberattack

This was the largest-ever cyber attack carried out against Israel

Jerusalem: A number of Israeli government websites went down in an apparent cyberattack as the country’s cyber authority confirmed it was a DDos attack that had blocked access to government websites, and that all websites were back online.

According to Haaretz, the websites of the interior, health, justice and welfare ministries had been taken offline, as was that of the Prime Minister’s Office.

Earlier on Monday, a senior defence official confirmed to Haaretz that a massive cyberattack was carried out on Monday evening against Israeli government websites, and cyber security industry sources said that the operation was a wide-scale distributed denial of service (DDos) attack.

A defence establishment source claims that this was the largest-ever cyber attack carried out against Israel. They believe that a state actor or large organization carried out the attack, but cannot yet determine who is behind it, the report said.

The defence establishment and the National Cyber Directorate have declared a state of emergency in order to study the extent of the damage, while checking strategic Israeli websites and government infrastructure, such as Israel’s electric and water companies, to see whether they were also attacked.

The defence establishment claims that the attack hit websites using the .GOV.IL domain, which is used for all government websites save for defence-related ones. Another website that uses this domain is the government database. Despite this, some of the websites can still be accessed via smartphone.

This post was last modified on March 15, 2022 3:04 pm

Share
Indo-Asian News Service

Indo-Asian News Service or IANS is a private Indian news agency. It was founded in 1986 by Indian American publisher Gopal Raju as the "India Abroad News Service" and later renamed. The service reports news, views and analysis from the subcontinent about the country, across a wide range of subjects.

Load more...