Skip to Content

Tag: OpIsrael

Shadow Talk Update – 04.16.2018

This week’s Shadow Talk discusses a Cisco Smart Install Client flaw exploited in disruption attack, an information leak vulnerability discovered in Microsoft Outlook, details on OpIcarus and OpIsrael, Verizon DBIR, and why you still should be excited about the RSA Conference.   Cisco Smart Install Client enabled mass disruption Attackers abused a legitimate Cisco Smart […]

Anonymous and the New Face of Hacktivism: What to Look Out For in 2018

The Anonymous collective has been the face of activism since 2008. Since then, the group’s membership, operations, and structure have changed significantly. In this blog, we examine the changes in Anonymous and look at how the group will continue to change in the coming years. The Anonymous collective rose to fame in 2008 and 2009. […]

OpIsrael Hacktivists Targeted By Unknown Threat Actor

Ideologically-motivated “hacktivist” actors can present a variety of threats to organizations from defacements, to denial of service attacks and sometimes even data compromise. Our analysts recently observed hacktivist actors themselves being targeted with malware. We recently identified evidence indicative of a malware distribution campaign apparently intended to deploy remote access trojans (RAT) onto the machines […]

OpIsrael: An Update

Last month our intelligence team published a blog on the use of ABI in understanding OpIsrael 2016, which suggested that the level of talk was indicative of an active campaign this year. But what can we learn from previous years? On Monday, the target list for OpIsrael was posted to Pastebin, containing contact information and […]