securityscorecard.com Open in urlscan Pro
2606:4700::6810:e350  Public Scan

URL: https://securityscorecard.com/research/hacktivist-involvement-in-israel-hamas-war-reflects-possible-shift-in-threat-actor-focus/
Submission: On October 30 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://securityscorecard.com/

<form role="search" class="searchform sf" action="https://securityscorecard.com/" method="GET">
  <input class="thegem-fullscreen-searchform-input sf-input" type="text" placeholder="Start typing to search..." name="s"
    data-styles="[&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce-temp.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio-products-extended.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-hovers.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/hovers\/thegem-hovers-fade.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-news-grid.css&quot;]" "="">
<div class=" sf-close"></div>
</form>

GET https://securityscorecard.com/

<form role="search" class="searchform sf" action="https://securityscorecard.com/" method="GET">
  <input class="thegem-fullscreen-searchform-input sf-input" type="text" placeholder="Start typing to search..." name="s"
    data-styles="[&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce-temp.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio-products-extended.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-hovers.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/hovers\/thegem-hovers-fade.css&quot;,&quot;https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-news-grid.css&quot;]" "="">
<div class=" sf-close"></div>
</form>

Text Content

THIS WEBSITE USES COOKIES

We use cookies to personalize content and ads, to provide social media features
and to analyze our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it
with other information that you’ve provided to them or that they’ve collected
from your use of their services.
Do not sell or share my personal information
Use necessary cookies only Allow all cookies Show details
OK
Use necessary cookies only Allow selection Allow all cookies
Necessary
Preferences
Statistics
Marketing
Show details
Cookie declaration [#IABV2SETTINGS#] About
 Necessary (28)  Preferences (7)  Statistics (48)  Marketing (70)  Unclassified
(18)
Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

NameProviderPurposeExpiryType__cf_bm [x7]797-bfk-857.mktoweb.com
Marketo
fonts.net
g2.com
G2Crowd
Hubspot
VimeoThis cookie is used to distinguish between humans and bots. This is
beneficial for the website, in order to make valid reports on the use of their
website.1 dayHTTPBIGipServer# [x2]797-bfk-857.mktoweb.comUsed to distribute
traffic to the website on several servers in order to optimise response
times.SessionHTTPcf_clearanceg2.comThis cookie is used to distinguish between
humans and bots. 1 yearHTTP_GRECAPTCHAGoogleThis cookie is used to distinguish
between humans and bots. This is beneficial for the website, in order to make
valid reports on the use of their website.180 daysHTTP_grecaptchaGoogleThis
cookie is used to distinguish between humans and bots. This is beneficial for
the website, in order to make valid reports on the use of their
website.PersistentHTMLrc::aGoogleThis cookie is used to distinguish between
humans and bots. This is beneficial for the website, in order to make valid
reports on the use of their website.PersistentHTMLrc::bGoogleThis cookie is used
to distinguish between humans and bots. SessionHTMLrc::cGoogleThis cookie is
used to distinguish between humans and bots. SessionHTMLrc::fGoogleThis cookie
is used to distinguish between humans and bots.
PersistentHTMLli_gcLinkedInStores the user's cookie consent state for the
current domain180 daysHTTPJSESSIONID [x2]New Relic
LinkedInPreserves users states across page
requests.SessionHTTPce_successful_csp_checkCrazyeggDetects whether user
behaviour tracking should be active on the website.
PersistentHTML_ce.cchCrazyeggStores the user's cookie consent state for the
current domainSessionHTTPCookieConsentCookiebotStores the user's cookie consent
state for the current domain1 yearHTTPelementorsecurityscorecard.comUsed in
context with the website's WordPress theme. The cookie allows the website owner
to implement or change the website's content in
real-time.PersistentHTMLAWSALBwww.g2.comRegisters which server-cluster is
serving the visitor. This is used in context with load balancing, in order to
optimize user experience. 7 daysHTTPAWSALBCORSwww.g2.comRegisters which
server-cluster is serving the visitor. This is used in context with load
balancing, in order to optimize user experience. 7 daysHTTPconnect.sidGartnerThe
cookie is necessary for secure log-in and the detection of any spam or abuse of
the website.1 dayHTTPbscookieLinkedInPending1
yearHTTPCONSENTsecurityscorecard.comUsed to detect if the visitor has accepted
the marketing category in the cookie banner. This cookie is necessary for
GDPR-compliance of the website. 2 yearsHTTP

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

NameProviderPurposeExpiryTypeloglevelsecurityscorecard.comMaintains settings and
outputs when using the Developer Tools Console on current
session.PersistentHTMLwistia-video-progress-#securityscorecard.comContains a
timestamp for the website’s video-content. This allows the user to resume
watching without having to start over, if the user leaves the video or website.
PersistentHTMLlangLinkedInSet by LinkedIn when a web page contains an embedded
"Follow us" panel.SessionHTTP_biz_flagsABizibleThis cookie serves multiple
purposes; it determines whether the user has submitted any forms, performed
cross-domain migration or has made any tracking opt-out choices. 1
yearHTTPwp-wpml_current_languagesecurityscorecard.comDesignates the country code
that is calculated based on the user's IP address. Used to determine what
language should be used for the
visitor.SessionHTTProute-gcrowd-fe-prodGartnerUsed to embed customer reviews
onto the site from third-party review sites.SessionHTTPli_alertsLinkedInUsed to
determine when and where certain pop-ups on the website should be presented for
the user and remember whether the user has closed these, to keep them from
showing multiple times.1 yearHTTP

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

NameProviderPurposeExpiryTypewistiasecurityscorecard.comUsed by the website to
track the visitor's use of video-content - The cookie roots from Wistia, which
provides video-software to websites.PersistentHTML_ga [x3]GoogleRegisters a
unique ID that is used to generate statistical data on how the visitor uses the
website.2 yearsHTTP_gid [x3]GoogleRegisters a unique ID that is used to generate
statistical data on how the visitor uses the website.1 dayHTTPm/uBizibleCollects
data on the user’s navigation and behavior on the website. This is used to
compile statistical reports and heatmaps for the website
owner.SessionPixelpendo_cdPendoRegisters statistical data on users' behaviour on
the website. Used for internal analytics by the website operator.
SessionHTMLsnowplowOutQueue_#_post2cdn-app.pathfactory.comRegisters statistical
data on users' behaviour on the website. Used for internal analytics by the
website operator.
PersistentHTMLsnowplowOutQueue_#_post2.expirescdn-app.pathfactory.comRegisters
statistical data on users' behaviour on the website. Used for internal analytics
by the website operator. PersistentHTML_g2_session_idg2.comSets a unique ID for
the session. This allows the website to obtain data on visitor behaviour for
statistical
purposes.SessionHTTPdtCookieGartnerPendingSessionHTTPdtLatCGartnerPendingSessionHTTPdtPCGartnerPendingSessionHTTPrxVisitorGartnerPendingSessionHTTPrxvtGartnerSets
a timestamp for when the visitor entered the website. This is used for
analytical purposes on the website. SessionHTTPcollectGoogleUsed to send data to
Google Analytics about the visitor's device and behavior. Tracks the visitor
across devices and marketing
channels.SessionPixelAnalyticsSyncHistoryLinkedInUsed in connection with
data-synchronization with third-party analysis service. 30
daysHTTPcetabidCrazyeggSets a unique ID for the session. This allows the website
to obtain data on visitor behaviour for statistical
purposes.SessionHTML__q_domainTestjs.qualified.comUsed in context with
Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses,
time spent on the website and page requests for the visit. This is used for
retargeting of multiple users rooting from the same IP-addresses. ABM usually
facilitates B2B marketing purposes.SessionHTTP_ce.clock_dataCrazyeggCollects
data on the user’s navigation and behavior on the website. This is used to
compile statistical reports and heatmaps for the website owner.1
dayHTTP_ce.clock_eventCrazyeggCollects data on the user’s navigation and
behavior on the website. This is used to compile statistical reports and
heatmaps for the website owner.1 dayHTTP_ce.gtldCrazyeggHolds which URL should
be presented to the visitor when visiting the site.
SessionHTTP_ce.sCrazyeggCollects data on the user’s navigation and behavior on
the website. This is used to compile statistical reports and heatmaps for the
website owner.1 yearHTTP_clckMicrosoftCollects data on the user’s navigation and
behavior on the website. This is used to compile statistical reports and
heatmaps for the website owner.1
yearHTTP_dd_swww.datadoghq-browser-agent.comRegisters the website's speed and
performance. This function can be used in context with statistics and
load-balancing.1 dayHTTP_ga_#GoogleUsed by Google Analytics to collect data on
the number of times a user has visited the website as well as dates for the
first and most recent visit. 2 yearsHTTP_gatGoogleUsed by Google Analytics to
throttle request rate1 dayHTTP_hp2_#Heap AnalyticsCollects data on the user’s
navigation and behavior on the website. This is used to compile statistical
reports and heatmaps for the website owner.1 dayHTTP_hp2_hld#.#Heap
AnalyticsCollects data on the user’s navigation and behavior on the website.
This is used to compile statistical reports and heatmaps for the website owner.1
dayHTTP_hp2_id.#Heap AnalyticsCollects data on the user’s navigation and
behavior on the website. This is used to compile statistical reports and
heatmaps for the website owner.1 yearHTTP_hp2_ses_props.#Heap AnalyticsCollects
data on the user’s navigation and behavior on the website. This is used to
compile statistical reports and heatmaps for the website owner.1
dayHTTPcebsCrazyeggTracks the individual sessions on the website, allowing the
website to compile statistical data from multiple visits. This data can also be
used to create leads for marketing purposes.SessionHTTPcebsp_CrazyeggCollects
data on the user’s navigation and behavior on the website. This is used to
compile statistical reports and heatmaps for the website
owner.SessionHTTPdd_cookie_test_#www.datadoghq-browser-agent.comRegisters data
on visitors' website-behaviour. This is used for internal analysis and website
optimization. 1 dayHTTPln_orLinkedInRegisters statistical data on users'
behaviour on the website. Used for internal analytics by the website operator. 1
dayHTTPvidcdn-app.pathfactory.comCollects data on visitor interaction with the
website's video-content. This data is used to make the website's video-content
more relevant towards the visitor. 2 yearsHTTPspsnowplow.comRegisters
statistical data on users' behaviour on the website. Used for internal analytics
by the website operator. 1 yearHTTPpersonalization_idTwitter Inc.This cookie is
set by Twitter - The cookie allows the visitor to share content from the website
onto their Twitter profile. 400 daysHTTPvuidVimeoCollects data on the user's
visits to the website, such as which pages have been read.2
yearsHTTP_cltkMicrosoftRegisters statistical data on users' behaviour on the
website. Used for internal analytics by the website operator.
SessionHTMLCLIDMicrosoftCollects data on the user’s navigation and behavior on
the website. This is used to compile statistical reports and heatmaps for the
website owner.1 yearHTTPevents_distinct_idwww.g2.comSets a unique ID for the
session. This allows the website to obtain data on visitor behaviour for
statistical purposes.SessionHTTPrxvisitidGartnerSets a unique ID for the
session. This allows the website to obtain data on visitor behaviour for
statistical
purposes.SessionHTMLrxVisitorGartnerPendingSessionHTMLrxvtGartnerDetermines when
the visitor last visited the different subpages on the website, as well as sets
a timestamp for when the session started.SessionHTMLtdGoogleRegisters
statistical data on users' behaviour on the website. Used for internal analytics
by the website operator. SessionPixel

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.

NameProviderPurposeExpiryTypega_clientIdsecurityscorecard.comUsed to send data
to Google Analytics about the visitor's device and behavior. Tracks the visitor
across devices and marketing
channels.PersistentHTMLyt.innertube::requestssecurityscorecard.comRegisters a
unique ID to keep statistics of what videos from YouTube the user has
seen.PersistentHTML6suuid6sc.coRegisters user behaviour and navigation on the
website, and any interaction with active campaigns. This is used for optimizing
advertisement and for efficient retargeting. 400 daysHTTP_uetsidMicrosoftUsed to
track visitors on multiple websites, in order to present relevant advertisement
based on the visitor's preferences. PersistentHTML_uetsid_expMicrosoftContains
the expiry-date for the cookie with corresponding name.
PersistentHTML_uetvidMicrosoftUsed to track visitors on multiple websites, in
order to present relevant advertisement based on the visitor's preferences.
PersistentHTML_uetvid_expMicrosoftContains the expiry-date for the cookie with
corresponding name. PersistentHTMLMR [x2]MicrosoftUsed to track visitors on
multiple websites, in order to present relevant advertisement based on the
visitor's preferences. 7 daysHTTPMUID [x2]MicrosoftUsed widely by Microsoft as a
unique user ID. The cookie enables user tracking by synchronising the ID across
many Microsoft domains.1 yearHTTPSRM_BMicrosoftTracks the user’s interaction
with the website’s search-bar-function. This data can be used to present the
user with relevant products or services. 1 yearHTTP_BUID [x2]BizibleCollects
data on visitors' preferences and behaviour on the website - This information is
used make content and advertisement more relevant to the specific visitor. 1
yearHTTPANONCHKMicrosoftRegisters data on visitors from multiple visits and on
multiple websites. This information is used to measure the efficiency of
advertisement on websites. 1 dayHTTPc.gifMicrosoftCollects data on the user’s
navigation and behavior on the website. This is used to compile statistical
reports and heatmaps for the website owner.SessionPixelSMMicrosoftRegisters a
unique ID that identifies the user's device during return visits across websites
that use the same ad network. The ID is used to allow targeted
ads.SessionHTTPm/ipvBizibleRegisters user behaviour and navigation on the
website, and any interaction with active campaigns. This is used for optimizing
advertisement and for efficient retargeting. SessionPixeluAdobeCollects data on
the user's visits to the website, such as the number of visits, average time
spent on the website and what pages have been loaded with the purpose of
generating reports for optimising the website
content.SessionPixelpendo_tabIdPendoCollects data on the user across websites -
This data is used to make advertisement more
relevant.SessionHTMLtest_cookieGoogleUsed to check if the user's browser
supports cookies.1 dayHTTP_fs_tab_idedge.fullstory.comTracks the individual
sessions on the website, allowing the website to compile statistical data from
multiple visits. This data can also be used to create leads for marketing
purposes.SessionHTMLads/ga-audiencesGoogleUsed by Google AdWords to re-engage
visitors that are likely to convert to customers based on the visitor's online
behaviour across
websites.SessionPixelpagead/1p-conversion/#/GooglePendingSessionPixelapi/telemetryHeap
AnalyticsCollects data on user behaviour and interaction in order to optimize
the website and make advertisement on the website more relevant.
SessionPixelhHeap AnalyticsCollects data on user behaviour and interaction in
order to optimize the website and make advertisement on the website more
relevant. SessionPixel_6senseCompanyDetailsj.6sc.coUsed in context with
Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses,
time spent on the website and page requests for the visit. This is used for
retargeting of multiple users rooting from the same IP-addresses. ABM usually
facilitates B2B marketing
purposes.PersistentHTML_session_idjukebox.pathfactory.comStores visitors'
navigation by registering landing pages - This allows the website to present
relevant products and/or measure their advertisement efficiency on other
websites. SessionHTTPbcookieLinkedInUsed by the social networking service,
LinkedIn, for tracking the use of embedded services.1
yearHTTPli_sugrLinkedInCollects data on user behaviour and interaction in order
to optimize the website and make advertisement on the website more relevant. 3
monthsHTTPlidcLinkedInUsed by the social networking service, LinkedIn, for
tracking the use of embedded services.1 dayHTTPUserMatchHistoryLinkedInUsed to
track visitors on multiple websites, in order to present relevant advertisement
based on the visitor's preferences. 30 daysHTTP_biz_dfsABizibleCollects data on
visitors' preferences and behaviour on the website - This information is used
make content and advertisement more relevant to the specific visitor.
SessionHTTP_biz_kvpABizibleCollects data on user visits to the website, such as
what pages have been accessed. The registered data is used to categorise the
user's interest and demographic profiles in terms of resales for targeted
marketing.SessionHTTP_biz_nABizibleCollects data on visitors' preferences and
behaviour on the website - This information is used make content and
advertisement more relevant to the specific visitor. 1
yearHTTP_biz_pendingABizibleCollects data on visitors' preferences and behaviour
on the website - This information is used make content and advertisement more
relevant to the specific visitor. 1 yearHTTP_biz_sidBizibleCollects data on
visitors' preferences and behaviour on the website - This information is used
make content and advertisement more relevant to the specific visitor. 1
dayHTTP_biz_uidBizibleCollects data on visitors' preferences and behaviour on
the website - This information is used make content and advertisement more
relevant to the specific visitor. 1 yearHTTP_clskMicrosoftRegisters statistical
data on users' behaviour on the website. Used for internal analytics by the
website operator. 1 dayHTTP_fbp Meta Platforms, Inc.Used by Facebook to deliver
a series of advertisement products such as real time bidding from third party
advertisers.3 monthsHTTP_gcl_auGoogleUsed by Google AdSense for experimenting
with advertisement efficiency across websites using their services. 3
monthsHTTP_gd_sessionj.6sc.coCollects visitor data related to the user's visits
to the website, such as the number of visits, average time spent on the website
and what pages have been loaded, with the purpose of displaying targeted ads.1
dayHTTP_gd_visitorj.6sc.coCollects visitor data related to the user's visits to
the website, such as the number of visits, average time spent on the website and
what pages have been loaded, with the purpose of displaying targeted ads.2
yearsHTTP_mkto_trkMarketoContains data on visitor behaviour and website
interaction. This is used in context with the email marketing service
Marketo.com, which allows the website to target visitors via email. 2
yearsHTTP_uetsidMicrosoftCollects data on visitor behaviour from multiple
websites, in order to present more relevant advertisement - This also allows the
website to limit the number of times that they are shown the same advertisement.
1 dayHTTP_uetvidMicrosoftUsed to track visitors on multiple websites, in order
to present relevant advertisement based on the visitor's preferences. 1
yearHTTPi/adsct [x2]Twitter Inc.The cookie is used by Twitter.com in order to
determine the number of visitors accessing the website through Twitter
advertisement content. SessionPixelmuc_adsTwitter Inc.Collects data on user
behaviour and interaction in order to optimize the website and make
advertisement on the website more relevant. 400 daysHTTPdtSaGartnerCollects data
on the user’s navigation and behavior on the website. This is used to compile
statistical reports and heatmaps for the website
owner.SessionHTMLLAST_RESULT_ENTRY_KEYYouTubeUsed to track user’s interaction
with embedded
content.SessionHTTPLogsDatabaseV2:V#||LogsRequestsStoreYouTubePendingPersistentIDBnextIdYouTubeUsed
to track user’s interaction with embedded
content.SessionHTTPremote_sidYouTubeNecessary for the implementation and
functionality of YouTube video-content on the website.
SessionHTTPrequestsYouTubeUsed to track user’s interaction with embedded
content.SessionHTTPServiceWorkerLogsDatabase#SWHealthLogYouTubeNecessary for the
implementation and functionality of YouTube video-content on the website.
PersistentIDBTESTCOOKIESENABLEDYouTubeUsed to track user’s interaction with
embedded content.1 dayHTTPVISITOR_INFO1_LIVEYouTubeTries to estimate the users'
bandwidth on pages with integrated YouTube videos.180
daysHTTPVISITOR_PRIVACY_METADATAsecurityscorecard.comPending180
daysHTTPYSCYouTubeRegisters a unique ID to keep statistics of what videos from
YouTube the user has seen.SessionHTTPyt.innertube::nextIdYouTubeRegisters a
unique ID to keep statistics of what videos from YouTube the user has
seen.PersistentHTMLytidb::LAST_RESULT_ENTRY_KEYYouTubeStores the user's video
player preferences using embedded YouTube
videoPersistentHTMLYtIdbMeta#databasesYouTubeUsed to track user’s interaction
with embedded content.PersistentIDByt-remote-cast-availableYouTubeStores the
user's video player preferences using embedded YouTube
videoSessionHTMLyt-remote-cast-installedYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-connected-devicesYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-device-idYouTubeStores the user's video player
preferences using embedded YouTube
videoPersistentHTMLyt-remote-fast-check-periodYouTubeStores the user's video
player preferences using embedded YouTube
videoSessionHTMLyt-remote-session-appYouTubeStores the user's video player
preferences using embedded YouTube
videoSessionHTMLyt-remote-session-nameYouTubeStores the user's video player
preferences using embedded YouTube videoSessionHTML

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

NameProviderPurposeExpiryTypece_localstorage_testsecurityscorecard.comPendingPersistentHTMLtuida.usbrowserspeed.comPending1
yearHTTP_pendo_guides_blocked.c18819ef-f185-46a7-6c2f-59bf376fc654PendoPendingPersistentHTML_pendo_meta.01234567-89ab-cdef-0123-456789abcdefPendoPendingPersistentHTML_pendo_visitorId.c18819ef-f185-46a7-6c2f-59bf376fc654PendoPendingPersistentHTML_lbvisitedcdn-app.pathfactory.comPendingPersistentHTML_lbvisitedcountcdn-app.pathfactory.comPendingPersistentHTMLspBeaconPreflight_jukeboxTracker_jukeboxTrackercdn-app.pathfactory.comPendingSessionHTMLspBeaconPreflight_jukeboxTracker_railsTrackercdn-app.pathfactory.comPendingSessionHTMLlastExternalReferrer
Meta Platforms, Inc.PendingPersistentHTMLlastExternalReferrerTime Meta
Platforms,
Inc.PendingPersistentHTMLcapterra_tracker.gifCapterraPendingSessionPixel__q_state_596DnzD85Gz1Abe4js.qualified.comPending10
yearsHTTP_pf_id.2350cdn-app.pathfactory.comPending2
yearsHTTP_pf_ses.2350cdn-app.pathfactory.comPending1
dayHTTPMetadata_session_idcdn.metadata.ioPending1
dayHTTPMetadata_visitor_idcdn.metadata.ioPending1
yearHTTPva_sidenav_opensecurityscorecard.comPending1 yearHTTP

 [#IABV2_LABEL_PURPOSES#]  [#IABV2_LABEL_FEATURES#]  [#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_BODY_FEATURES#]
[#IABV2_BODY_PARTNERS#]
Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.

Please state your consent ID and date when you contact us regarding your
consent.
Cookie declaration last updated on 05.10.23 by Cookiebot
Scroll Top
 * Support
 * Login
 * Contact
 * Blog



 * Support
 * Login
 * Contact
 * Blog

 * Products
   
   
   PRODUCTS
   
    * Security Ratings
      Identify security strengths across ten risk factors.
    * Threat and Risk Intelligence
      Get actionable, data-based insights.
    * Security Questionnaires
      Automate security questionnaire exchange.
    * Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
   
    
   
    * Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    * Cyber Risk Quantification
      Translate cyber risk into financial impact.
    * Reporting Center
      Streamline cyber risk reporting.
    * SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
   
   
   BUY NOW
   
    * Compare Plans
      Choose a plan that's right for your business.
    * Try It Free
      Evaluate the platform – free for 14 days.
    * Request a Demo
      See the platform capabilities in action.
    * Contact Us
      Contact us with any questions.
    * Locate a Partner
      Access our industry-leading partner network.
   
   icon__SSClogoMark icon__SSClogoMark
   
   Understand and reduce risk with SecurityScorecard.
   
   Start Free Trial
 * Services
   
   
   SERVICES NEW
   
    * Digital Forensics & Incident Response
      Prepare to respond to any threat.
    * Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    * Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
   
    
   
    * Penetration Testing
      Uncover your vulnerabilities before an attack does.
    * Red Team
      Use scenarios to perform a simulated attack.
    * Tabletop Exercises
      Test your incident response plan & bolster your readiness.
   
   UNDER CYBER ATTACK?
   
   Contact us for immediate support if you believe your organization is the
   victim of a cyber attack.
   
   Contact Cyber 911 Team
 * Solutions
   
   
   BY USE CASE
   
    * Compliance
    * Cyber Insurance
    * Digital Forensics
    * Due Diligence
    * Enterprise Cyber Risk
   
    * Executive-Level Reporting
    * Incident Response
    * Regulatory Oversight
    * Third-Party Risk
   
   
   BY INDUSTRY
   
    * Critical Infrastructure
    * Enterprise
    * Financial Services
    * Public Sector
    * Healthcare
   
    * Insurance
    * Retail & Consumer
    * Technology
   
   HELP YOUR ORGANIZATION CALCULATE ITS RISK
   
   View All Solutions
 * Customers
   
   
   OUR CUSTOMERS
   
    * Customer Overview
      Trusted by companies of all industries and sizes.
    * Peer Reviews
      Find out what our customers are saying.
   
   
   SUCCESS AND SUPPORT
   
    * Customer Success
      Receive award-winning customer service.
    * Support
      Get your questions answered by our experts.
   
   
   COMMUNITY
   
    * SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    * Connect Login
      Join our exclusive online customer community.
   
   icon__SSClogoMark icon__SSClogoMark
   
   UNDERSTAND AND REDUCE RISK WITH SECURITYSCORECARD.
   
   Free account sign up
 * Partners
   
   
   PARTNER PROGRAM OVERVIEW
   
   Partner with SecurityScorecard and leverage our global cybersecurity ratings
   leadership to expand your solution, deliver more value, and win new business.
   
   Learn more
    * Locate a Partner
      Access our industry-leading partner network.
    * Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    * Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    * ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
   
    * Technology Alliances
      Access innovative solutions from leading providers.
    * SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    * SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.
   
   Understand and reduce risk with SecurityScorecard.
   
   Free account sign up
 * Resources
   
   
   RESOURCES
   
    * Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    * SecurityScorecard Blog
      Read the latest blog posts published weekly.
    * Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    * SecurityScorecard Academy
      Complete certification courses and earn industry-recognized badges.
    * Learning Center
      Discover in-depth insights, real-world examples, and cybersecurity best
      practices.
   
   
   TOOLS AND DOCUMENTATION
   
    * Product Release Notes
      Visit our support portal for the latest release notes.
    * CVE Details
      NEW
      View our database of security vulnerabilities.
    * Chrome Extension
      Show the security rating of websites you visit.
    * Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
   
   TRUST BEGINS WITH TRANSPARENCY. TAKE A LOOK AT THE DATA THAT DRIVES OUR
   RATINGS.
   
   Learn more
 * Company
   
   
   WORKING AT SECURITYSCORECARD
   
   Committed to promoting diversity, inclusion, and collaboration–and having fun
   while doing it.
   
   Join our team
    * About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    * Leadership
      Meet the team that is making the world a safer place.
    * Press
      Explore our most recent press releases and coverage.
    * Events
      Join us at any of these upcoming industry events.
   
    * Policy Insights
      Raising the bar on cybersecurity with security ratings.
    * Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    * Contact Us
      Contact us with any questions, concerns, or thoughts.
    * Trust Portal
      Take an inside look at the data that drives our technology.
    * Help Center
      We are here to help with any questions or difficulties.
   
   
 * Pricing


Request a demo



RESEARCH & INSIGHTS CENTER


CYBER RISK INTELLIGENCE UPDATE: HACKTIVIST INVOLVEMENT IN ISRAEL-HAMAS WAR
REFLECTS POSSIBLE SHIFT IN THREAT ACTOR FOCUS

The SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement
(STRIKE) Team has continued its monitoring of threat actors involved in the war
between Israel and Hamas and has integrated this monitoring into its ongoing
deep and dark web (DDW) collections.


KEY TAKEAWAYS

Analysis of these collections appears, as of October 20, to support the
following conclusions:

 * Relatively low-sophistication hacktivist groups, motivated mainly by
   attention, have remained the most prominent cyber actors involved in the
   conflict.
 * These groups’ recent message histories suggest that some of the most
   prominent groups’ targeting of organizations in Israel may have slowed
   somewhat after an initial period in approximately the first week of the war
   (October 7-14) in which they circulated a notably high volume of claims of
   attacks against Israeli organizations.
 * Some groups have claimed no new attacks, while others appear to have focused
   more on targets outside Israel. The group-specific findings listed below are
   also discussed at greater length in the appendices following the conclusion
   of this update.
   * The Persian-language, pro-Palestinian hacktivist channel Solomon’s Ring has
     not claimed an attack since October 8.
   * KillNet Palestine (whose name suggests it is a Palestine-based or
     especially pro-Palestinian affiliate or sub-group of the Russian hacktivist
     group KIllNet) has posted no new content since the message announcing its
     channel’s foundation on October 13.
   * The most recent claims of some groups, including both Cyber Av3ngers (a
     hacktivist group believed to act in support of Iranian interests) and the
     purportedly Palestinian Electronic_Tigers_Unit, are both non-specific and
     unsubstantiated.
   * The pro-Palestinian, Arabic-language Force Electronic Quds channel has most
     recently highlighted its defensive capabilities rather than claiming
     attacks.
   * Two of the three attacks the self-described “Yemeni Hackers” 1915 Team
     claimed on October 20 targeted Indian organizations.
   * On October 15, Anonymous Sudan began claiming attacks against Kenyan
     targets in response to the Kenyan government’s support for Israel.
   * Dark Storm Team’s most recent claim (October 18) was against Snapchat.
   * KillNet’s most recent claim (made on October 14) was against a Ukrainian
     energy company.

Claims of attacks against Israeli targets have not, of course, stopped
entirely. 

 * Anonymous Sudan claimed a DDoS against RedAlert (an Israeli missile attack
   alerting app targeted earlier in the conflict) on October 20.
 * Ghosts of Palestine claimed attacks against Israeli government sites on
   October 19 and 20.
 * The Moroccan Black Cyber Army claimed an attack against an Israeli gaming
   site and a theft of sensitive Israeli documents on October 20.
 * The pro-Palestinian Muslim Cyber Army claimed one of the same attacks as
   Ghosts of Palestine on October 19 and it claimed a breach of Israeli
   citizens’ personal data on October 20.
 * The long-standing Turkish hacktivist group AslanNeferler Tim claimed attacks
   against an Israeli weapons manufacturer on October 19 and the Israeli Air
   Force on October 15.
 * SS Cyber Team made unsubstantiated claims of access to an Israeli database on
   October 17.
   * As with the Muslim Cyber Army’s claim, this breach is unconfirmed and may
     simply re-circulate data exposed prior to the war.


 CONCLUSION

While the claimed targeting of non-Israeli organizations is not a novel
dimension of the cyber activity that has accompanied this war, its persistence
appears noteworthy, especially when considered alongside the apparent decrease
in some groups’ targeting of Israeli organizations. While the ground war
continues to present risks of regional escalation, the recent attacks against
Kenyan and Indian organizations illustrate just how far beyond the region the
cyber conflict has already expanded.


APPENDICES: GROUP-SPECIFIC FINDINGS


KILLNET

Killnet’s most recently claimed attack occurred on October 14 and targeted a
Ukrainian energy company. Given that KillNet has operated in support of Russian
geopolitical interests for much of its history,and focused on targets related to
the war in Ukraine for much of that history, this may reflect a return to form
for the group. 



Image 1: KillNet’s most recent attack claim, an attempt against a Ukrainian
energy company on October 14.


KILLNET PALESTINE

The Palestine-specific KillNet channel KILLNET PALESTINE was created Oct. 13,
but as of October 20, has posted no new messages since then.



Image 2: KILLNET PALESTINE’s only post


SOLOMON’S RING

This Persian-language, pro-Palestinian (and presumably Iranian) hacktivist group
has been active since October 2022 and circulated its most recent claim
regarding an attack (an unsupported claim to have stolen data from an “important
Israeli data center”) on October 7, 2023.



Image 3: On October 7, Solomon’s Ring posted, “By Divine Power and Strength, one
of Israel’s important data centers was hacked by the Solomon’s Ring hackers.
Information is currently being downloaded. All of the data will be published
shortly.”

 

As of October 20, the group has not circulated the data it claimed to be
downloading on October 7 or provided other evidence that it compromised an
Israeli data center. Indeed, it has not posted new content of any sort since
October 11.


DARK STORM TEAM

Despite its avowed pro-Palestinian stance, Dark Strom [sic] Team has claimed
attacks on targets—both inside Israel and out—throughout its history, and
appears to have commercial motivations in addition to political ones. These
aspects of its history suggest an outlook similar to KillNet’s.

The channel was created on August 18, 2023 and claimed its attack, which focused
on Israel, on August 21.

Image 4: Dark Storm Team’s first attack targeted an Israeli hospital.

 

With the start of the current war, the group targeted the Israeli government and
sensitive industries in a series of claims on October 8 and 9.



Images 5-6: The group claimed attacks against an Israeli municipality and
alerting company early in the current conflict.

 

However, on October 15, the group claimed a DDoS attack against John F. Kennedy
International Airport (JFK) in New York on the grounds that it is “the most
welcoming airport for the Zionist entity.”

 



Image 7: Dark Strom Team claimed an attack against JFK airport on October 15.

 

This attack appears to prefigure an October 17 declaration that the group would
target any entity perceived to support Israel.



Image 8: The group declared it would target “any country…that supports the
occupying entity” on October 17.

 

As of October 20, the most recent attack claim circulated by the channel  was of
an attempt against Snapchat on October 18, which may speak to the group’s
international focus.



Image 9: Dark Strom Team claimed a disruption to Snapchat on October 18.

 

Closer study of the group’s history suggests that its motivations may be less
strictly pro-Palestinian than they initially appear. Despite its declared
sympathies with the Palestinian cause, it also advertises  DDoS-as-a-service and
commercial malware offerings, while also claiming attacks outside of Israel.
This may simultaneously serve to bolster the group’s reputation (and thus drive
business) and reflect a pro-Russian geopolitical orientation.

Indeed, the channel’s most recent messages additionally suggest that the group’s
financial motivations have remained strong, despite the outbreak of the war. As
of October 20, the six most recent messages displayed in the channel have all
been advertisements.





Images 10-11: Dark Strom Team’s most recent posts advertised
cybercrime-as-a-service and commercial malware offerings.

 

These recent posts resemble earlier ones that also suggested financial
motivations. The  group offered a discount on its services on September 16 and
circulated a “menu” of hacking services on September 22:



Images 12-13: Pre-war posts by Dark Strom Team reflect financial motivations.

 

The group’s long history of targeting entities outside of Israel may reflect
attempts to build a reputation for commercial purposes, but may also suggest a
broader anti-NATO (and therefore possibly pro-Russian) geopolitical outlook
instead of a strictly pro-Palestinian one. The group claimed an attack against
another U.S. airport’s website before the start of the war, and made no mention
of American support for Israel when claiming the attack.



Image 14: the group claimed a previous attack against Los Angeles Airport on
September 11.

 

This may suggest that the group’s activities have been less uniquely focused on
the Palestinian cause than they initially appeared and may offer a point of
comparison between Dark Strom Team and KillNet, which has also attempted attacks
against US airports.

And even though the group’s messaging focuses on the Palestinian cause, it may
(like KillNet and Anonymous Sudan) act in support of Russian geopolitical
interests. For much of its history, it has targeted NATO member states and
others that have declared their support for Ukraine.

One of the group’s first attacks on August 23 targeted Denmark, a September 10
attack targeted the Netherlands, and Dark Strom Team stated its intent to launch
further attacks against NATO on September 14.



Images 15-17: The group has previously declared its intent to attack
NATO-affiliated targets.

 

Taken together, the group’s cybercrime-as-a-service offerings and stated
hostility to NATO suggest a profile similar to KillNet. Though it seemed to
have  strictly financial motivations at the time of its founding as a
DDoS-as-a-Service group, it appears to have acquired more explicitly political
motivations since the outbreak of the war between Russia and Ukraine.
Subsequently, it has claimed a wide variety of attacks against entities in NATO
member states.


1915 TEAM

1915 Team circulated images of a supposed leak of an Israeli military
spokesperson’s personal data on October 20. The image may, however, be
fabricated or the data may be outdated, as the image features a password dating
back to 2019.



Image 18: The “Yemeni Hackers” of the 1915 Team circulated images purporting to
contain an Israeli military spokesperson’s personal data on October 20.

 

Before that, the most specific claim they made regarding cyber activity was an
October 11 announcement that they would launch ransomware attacks against
Israel. However, these claims remain unsubstantiated as of October 20.



Image 19: 1915 Team previously shared claims of new ransomware attacks against
Israeli and allied targets on October 11.


ELECTRONIC_TIGERS_UNIT

The Electronic_Tigers_Unit describes itself as a politically independent group
of cyber actors committed to defending Muslims and resisting Israel. Its most
recent post was on October 18, but its most recent claims of specific cyber
activity occurred two days prior. On October 16, it circulated unsubstantiated
claims of access to Israeli supervisory control and data acquisition (SCADA)
systems and other critical infrastructure.



Image 20: Electronic_Tigers_Unit shared claims of access to Israeli
infrastructure on October 16.

 

However, the video the group shared in support of these claims may not indicate
access to uniquely sensitive systems specifically located in Israel; the only
support for the claim is the video’s use of satellite imagery of a location in
Israel sourced from Google Maps:



Image 21: Electronic_Tigers_Unit shared images apparently originating from
Google Maps to support its claims of access to sensitive Israeli targets.

 

On the same date, the group also claimed access to Israeli police data but
offered little evidence to support the claim.



Image 22: Electronic_Tigers_Unit also claimed access to Israeli police data on
October 16.


FORCE ELECTRONIC QUDS

The most recent claims made on the pro-Palestinian, Arabic-language channel
Force Electronic Quds (a literal, if somewhat unnatural, English rendering of
its Arabic name, فليق القدس الاكتروني; “the Electronic Quds Force” would be the
more likely word order in English) have highlighted the group’s defensive
capabilities rather than claimed attacks against Israel, as indicated by two
posts made on October 16:



Image 23: In one of its October 16 posts, Force Electronic Quds wrote, “We are
in the line of fire in this battle, and we emphasize that we have new methods,
not only methods of electronic attacks on Zionist targets but [also] defensive
methods that counter the work of the failed Zionist intelligence system.”





Image 24: in another of its posts on October 16, Force Electronic Quds claimed,
“We thwarted a large number of failed attempts by the Zionist intelligence
system to hack the phones of Palestinian citizens in the Gaza Strip, as our
defensive methods are highly successful.”


ASLAN NEFERLER TIM

The long-standing Turkish hacktivist group Aslan Neferler Tim’s most
recently-claimed attack came on October 19, when it purportedly disrupted the
operations of an Israeli arms company’s website.



Image 25: Aslan Neferler Tim claimed to have interrupted the service of Israel
Weapon Industries (IWI)’s website on October 19.

 

Prior to the claimed attack against Israel Weapon Industries (IWI), Aslan
Neferler Tim similarly claimed to have disrupted the Israeli Air Force’s website
on October 15:



Image 26: Aslan Neferler Tim claimed an attack against the Israeli Air Force on
October 15.


ANONYMOUS SUDAN

Anonymous Sudan claimed attacks against Israeli alerting app RedAlert’s website
on October 20. However, these claims would not necessarily indicate that the
attack affected the alerting service itself, given that the alerting application
and website likely use different infrastructure. However, especially given
previous attacks against the same service earlier in the conflict, these claims,
if circulated widely enough, could still have a psychological effect.



Image 27-28: Anonymous Sudan claimed to have disrupted the operations of
RedAlert’s website, despite its geographically-specific traffic restrictions, on
October 20.

 

Notably, however, before October 20, Anonymous Sudan’s most recent claims
occurred on October 15, when the group declared it would target Kenyan
organizations due to Kenya’s support for Israel—this may speak to the growing
international scope of the cyber conflict.



Images 29-30: Anonymous Sudan claimed attacks against the Kenyan rail service on
October 15.


GHOSTS OF PALESTINE

Ghosts of Palestine’s focus has remained on Israeli targets. The group most
recently claimed an attack against govforms.gov[.]il on October 20 and claimed
attacks against the Israeli Ministry of Education one day prior.



Images 31-32: Ghosts of Palestine claimed  attacks against an Israeli government
site on October 20 and an attack against the Israeli Ministry of Education on
October 19.


MOROCCAN BLACK CYBER ARMY

Similarly, the Moroccan Black Cyber Army’s most recent claims are of a DDoS
attack against an Israeli gaming site and a theft of sensitive Israeli documents
on October 20.



Images 33-34: The Moroccan Black Cyber Army made unsubstantiated claims of
attacks against Israeli organizations on October 20.


CYBER AV3NGERS

The Iran-linked Cyber Av3ngers hacktivist group claimed an attack on Israeli
electric infrastructure on October 17. However, no public reporting supports
this claim.



 

Image 35: Cyber Av3ngers made unsubstantiated claims of a disruption to Israeli
energy infrastructure on October 17.


SS CYBER TEAM

The openly anti-Semitic SS Cyber Team most recently made an unsubstantiated
claim to have breached Israeli databases on October 17.



Image 36: SS Cyber Team circulated the contents of purportedly breached Israeli
databases on October 17.


MUSLIM CYBER ARMY

Like Ghosts of Palestine, the Muslim Cyber Army claimed the October 19 attack
against the Israeli Ministry of Education. More recently, the group claimed data
thefts on October 19 and 20. The images circulated in support of these claims,
however, may either be forged or taken out of context, and could contain data
exposed prior to the war.



Images 37-39: The Muslim Cyber Army made unsubstantiated claims of attacks and
data thefts against Israeli targets on October 19 and 20.

RELATED ARTICLES


A DETAILED ANALYSIS OF THE MONEY MESSAGE RANSOMWARE

The threat actor group, Money Message ransomware, first appeared in March 2023,
demanding million-dollar ransoms from its targets. Its configuration,

Read More »
09/14/2023


DORA: A JOURNEY TO CYBER RESILIENCE

DORA’s Pillars of Transformation Included in DORA are five key pillars that will
shape how financial services organizations manage Information

Read More »
09/07/2023


DIGITAL FORENSICS & INCIDENT RESPONSE DATASHEET

Be prepared to respond to any threat right away with guaranteed support.

Read More »
09/07/2023
Return to RESOURCES
Products
Solutions
Customers
Marketplace
Partners
Resources
Company
Trust Portal
Security Ratings
Login
Blog
Contact
Careers

SecurityScorecard
Tower 49
12 E 49th St
Suite 15-100
New York, NY 10017

info@securityscorecard.io

United States: (800) 682-1701
International: +1(646) 809-2166
Social-linkedin Social-facebook Twitter Instagram Youtube
 * Terms of Use
 * Privacy Policy
 * Patents
 * Cookies

© 2022 SecurityScorecard