securityscorecard.com
Open in
urlscan Pro
2606:4700::6810:e350
Public Scan
URL:
https://securityscorecard.com/research/hacktivist-involvement-in-israel-hamas-war-reflects-possible-shift-in-threat-actor-focus/
Submission: On October 30 via api from TR — Scanned from DE
Submission: On October 30 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOMGET https://securityscorecard.com/
<form role="search" class="searchform sf" action="https://securityscorecard.com/" method="GET">
<input class="thegem-fullscreen-searchform-input sf-input" type="text" placeholder="Start typing to search..." name="s"
data-styles="["https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce-temp.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio-products-extended.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-hovers.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/hovers\/thegem-hovers-fade.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-news-grid.css"]" "="">
<div class=" sf-close"></div>
</form>
GET https://securityscorecard.com/
<form role="search" class="searchform sf" action="https://securityscorecard.com/" method="GET">
<input class="thegem-fullscreen-searchform-input sf-input" type="text" placeholder="Start typing to search..." name="s"
data-styles="["https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-woocommerce-temp.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-portfolio-products-extended.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-hovers.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/hovers\/thegem-hovers-fade.css","https:\/\/securityscorecard.com\/wp-content\/themes\/thegem-elementor\/css\/thegem-news-grid.css"]" "="">
<div class=" sf-close"></div>
</form>
Text Content
THIS WEBSITE USES COOKIES We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. Do not sell or share my personal information Use necessary cookies only Allow all cookies Show details OK Use necessary cookies only Allow selection Allow all cookies Necessary Preferences Statistics Marketing Show details Cookie declaration [#IABV2SETTINGS#] About Necessary (28) Preferences (7) Statistics (48) Marketing (70) Unclassified (18) Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies. NameProviderPurposeExpiryType__cf_bm [x7]797-bfk-857.mktoweb.com Marketo fonts.net g2.com G2Crowd Hubspot VimeoThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.1 dayHTTPBIGipServer# [x2]797-bfk-857.mktoweb.comUsed to distribute traffic to the website on several servers in order to optimise response times.SessionHTTPcf_clearanceg2.comThis cookie is used to distinguish between humans and bots. 1 yearHTTP_GRECAPTCHAGoogleThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.180 daysHTTP_grecaptchaGoogleThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.PersistentHTMLrc::aGoogleThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.PersistentHTMLrc::bGoogleThis cookie is used to distinguish between humans and bots. SessionHTMLrc::cGoogleThis cookie is used to distinguish between humans and bots. SessionHTMLrc::fGoogleThis cookie is used to distinguish between humans and bots. PersistentHTMLli_gcLinkedInStores the user's cookie consent state for the current domain180 daysHTTPJSESSIONID [x2]New Relic LinkedInPreserves users states across page requests.SessionHTTPce_successful_csp_checkCrazyeggDetects whether user behaviour tracking should be active on the website. PersistentHTML_ce.cchCrazyeggStores the user's cookie consent state for the current domainSessionHTTPCookieConsentCookiebotStores the user's cookie consent state for the current domain1 yearHTTPelementorsecurityscorecard.comUsed in context with the website's WordPress theme. The cookie allows the website owner to implement or change the website's content in real-time.PersistentHTMLAWSALBwww.g2.comRegisters which server-cluster is serving the visitor. This is used in context with load balancing, in order to optimize user experience. 7 daysHTTPAWSALBCORSwww.g2.comRegisters which server-cluster is serving the visitor. This is used in context with load balancing, in order to optimize user experience. 7 daysHTTPconnect.sidGartnerThe cookie is necessary for secure log-in and the detection of any spam or abuse of the website.1 dayHTTPbscookieLinkedInPending1 yearHTTPCONSENTsecurityscorecard.comUsed to detect if the visitor has accepted the marketing category in the cookie banner. This cookie is necessary for GDPR-compliance of the website. 2 yearsHTTP Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in. NameProviderPurposeExpiryTypeloglevelsecurityscorecard.comMaintains settings and outputs when using the Developer Tools Console on current session.PersistentHTMLwistia-video-progress-#securityscorecard.comContains a timestamp for the website’s video-content. This allows the user to resume watching without having to start over, if the user leaves the video or website. PersistentHTMLlangLinkedInSet by LinkedIn when a web page contains an embedded "Follow us" panel.SessionHTTP_biz_flagsABizibleThis cookie serves multiple purposes; it determines whether the user has submitted any forms, performed cross-domain migration or has made any tracking opt-out choices. 1 yearHTTPwp-wpml_current_languagesecurityscorecard.comDesignates the country code that is calculated based on the user's IP address. Used to determine what language should be used for the visitor.SessionHTTProute-gcrowd-fe-prodGartnerUsed to embed customer reviews onto the site from third-party review sites.SessionHTTPli_alertsLinkedInUsed to determine when and where certain pop-ups on the website should be presented for the user and remember whether the user has closed these, to keep them from showing multiple times.1 yearHTTP Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously. NameProviderPurposeExpiryTypewistiasecurityscorecard.comUsed by the website to track the visitor's use of video-content - The cookie roots from Wistia, which provides video-software to websites.PersistentHTML_ga [x3]GoogleRegisters a unique ID that is used to generate statistical data on how the visitor uses the website.2 yearsHTTP_gid [x3]GoogleRegisters a unique ID that is used to generate statistical data on how the visitor uses the website.1 dayHTTPm/uBizibleCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.SessionPixelpendo_cdPendoRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. SessionHTMLsnowplowOutQueue_#_post2cdn-app.pathfactory.comRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. PersistentHTMLsnowplowOutQueue_#_post2.expirescdn-app.pathfactory.comRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. PersistentHTML_g2_session_idg2.comSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes.SessionHTTPdtCookieGartnerPendingSessionHTTPdtLatCGartnerPendingSessionHTTPdtPCGartnerPendingSessionHTTPrxVisitorGartnerPendingSessionHTTPrxvtGartnerSets a timestamp for when the visitor entered the website. This is used for analytical purposes on the website. SessionHTTPcollectGoogleUsed to send data to Google Analytics about the visitor's device and behavior. Tracks the visitor across devices and marketing channels.SessionPixelAnalyticsSyncHistoryLinkedInUsed in connection with data-synchronization with third-party analysis service. 30 daysHTTPcetabidCrazyeggSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes.SessionHTML__q_domainTestjs.qualified.comUsed in context with Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses, time spent on the website and page requests for the visit. This is used for retargeting of multiple users rooting from the same IP-addresses. ABM usually facilitates B2B marketing purposes.SessionHTTP_ce.clock_dataCrazyeggCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 dayHTTP_ce.clock_eventCrazyeggCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 dayHTTP_ce.gtldCrazyeggHolds which URL should be presented to the visitor when visiting the site. SessionHTTP_ce.sCrazyeggCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 yearHTTP_clckMicrosoftCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 yearHTTP_dd_swww.datadoghq-browser-agent.comRegisters the website's speed and performance. This function can be used in context with statistics and load-balancing.1 dayHTTP_ga_#GoogleUsed by Google Analytics to collect data on the number of times a user has visited the website as well as dates for the first and most recent visit. 2 yearsHTTP_gatGoogleUsed by Google Analytics to throttle request rate1 dayHTTP_hp2_#Heap AnalyticsCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 dayHTTP_hp2_hld#.#Heap AnalyticsCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 dayHTTP_hp2_id.#Heap AnalyticsCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 yearHTTP_hp2_ses_props.#Heap AnalyticsCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 dayHTTPcebsCrazyeggTracks the individual sessions on the website, allowing the website to compile statistical data from multiple visits. This data can also be used to create leads for marketing purposes.SessionHTTPcebsp_CrazyeggCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.SessionHTTPdd_cookie_test_#www.datadoghq-browser-agent.comRegisters data on visitors' website-behaviour. This is used for internal analysis and website optimization. 1 dayHTTPln_orLinkedInRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. 1 dayHTTPvidcdn-app.pathfactory.comCollects data on visitor interaction with the website's video-content. This data is used to make the website's video-content more relevant towards the visitor. 2 yearsHTTPspsnowplow.comRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. 1 yearHTTPpersonalization_idTwitter Inc.This cookie is set by Twitter - The cookie allows the visitor to share content from the website onto their Twitter profile. 400 daysHTTPvuidVimeoCollects data on the user's visits to the website, such as which pages have been read.2 yearsHTTP_cltkMicrosoftRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. SessionHTMLCLIDMicrosoftCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.1 yearHTTPevents_distinct_idwww.g2.comSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes.SessionHTTPrxvisitidGartnerSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes.SessionHTMLrxVisitorGartnerPendingSessionHTMLrxvtGartnerDetermines when the visitor last visited the different subpages on the website, as well as sets a timestamp for when the session started.SessionHTMLtdGoogleRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. SessionPixel Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers. NameProviderPurposeExpiryTypega_clientIdsecurityscorecard.comUsed to send data to Google Analytics about the visitor's device and behavior. Tracks the visitor across devices and marketing channels.PersistentHTMLyt.innertube::requestssecurityscorecard.comRegisters a unique ID to keep statistics of what videos from YouTube the user has seen.PersistentHTML6suuid6sc.coRegisters user behaviour and navigation on the website, and any interaction with active campaigns. This is used for optimizing advertisement and for efficient retargeting. 400 daysHTTP_uetsidMicrosoftUsed to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences. PersistentHTML_uetsid_expMicrosoftContains the expiry-date for the cookie with corresponding name. PersistentHTML_uetvidMicrosoftUsed to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences. PersistentHTML_uetvid_expMicrosoftContains the expiry-date for the cookie with corresponding name. PersistentHTMLMR [x2]MicrosoftUsed to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences. 7 daysHTTPMUID [x2]MicrosoftUsed widely by Microsoft as a unique user ID. The cookie enables user tracking by synchronising the ID across many Microsoft domains.1 yearHTTPSRM_BMicrosoftTracks the user’s interaction with the website’s search-bar-function. This data can be used to present the user with relevant products or services. 1 yearHTTP_BUID [x2]BizibleCollects data on visitors' preferences and behaviour on the website - This information is used make content and advertisement more relevant to the specific visitor. 1 yearHTTPANONCHKMicrosoftRegisters data on visitors from multiple visits and on multiple websites. This information is used to measure the efficiency of advertisement on websites. 1 dayHTTPc.gifMicrosoftCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.SessionPixelSMMicrosoftRegisters a unique ID that identifies the user's device during return visits across websites that use the same ad network. The ID is used to allow targeted ads.SessionHTTPm/ipvBizibleRegisters user behaviour and navigation on the website, and any interaction with active campaigns. This is used for optimizing advertisement and for efficient retargeting. SessionPixeluAdobeCollects data on the user's visits to the website, such as the number of visits, average time spent on the website and what pages have been loaded with the purpose of generating reports for optimising the website content.SessionPixelpendo_tabIdPendoCollects data on the user across websites - This data is used to make advertisement more relevant.SessionHTMLtest_cookieGoogleUsed to check if the user's browser supports cookies.1 dayHTTP_fs_tab_idedge.fullstory.comTracks the individual sessions on the website, allowing the website to compile statistical data from multiple visits. This data can also be used to create leads for marketing purposes.SessionHTMLads/ga-audiencesGoogleUsed by Google AdWords to re-engage visitors that are likely to convert to customers based on the visitor's online behaviour across websites.SessionPixelpagead/1p-conversion/#/GooglePendingSessionPixelapi/telemetryHeap AnalyticsCollects data on user behaviour and interaction in order to optimize the website and make advertisement on the website more relevant. SessionPixelhHeap AnalyticsCollects data on user behaviour and interaction in order to optimize the website and make advertisement on the website more relevant. SessionPixel_6senseCompanyDetailsj.6sc.coUsed in context with Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses, time spent on the website and page requests for the visit. This is used for retargeting of multiple users rooting from the same IP-addresses. ABM usually facilitates B2B marketing purposes.PersistentHTML_session_idjukebox.pathfactory.comStores visitors' navigation by registering landing pages - This allows the website to present relevant products and/or measure their advertisement efficiency on other websites. SessionHTTPbcookieLinkedInUsed by the social networking service, LinkedIn, for tracking the use of embedded services.1 yearHTTPli_sugrLinkedInCollects data on user behaviour and interaction in order to optimize the website and make advertisement on the website more relevant. 3 monthsHTTPlidcLinkedInUsed by the social networking service, LinkedIn, for tracking the use of embedded services.1 dayHTTPUserMatchHistoryLinkedInUsed to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences. 30 daysHTTP_biz_dfsABizibleCollects data on visitors' preferences and behaviour on the website - This information is used make content and advertisement more relevant to the specific visitor. SessionHTTP_biz_kvpABizibleCollects data on user visits to the website, such as what pages have been accessed. The registered data is used to categorise the user's interest and demographic profiles in terms of resales for targeted marketing.SessionHTTP_biz_nABizibleCollects data on visitors' preferences and behaviour on the website - This information is used make content and advertisement more relevant to the specific visitor. 1 yearHTTP_biz_pendingABizibleCollects data on visitors' preferences and behaviour on the website - This information is used make content and advertisement more relevant to the specific visitor. 1 yearHTTP_biz_sidBizibleCollects data on visitors' preferences and behaviour on the website - This information is used make content and advertisement more relevant to the specific visitor. 1 dayHTTP_biz_uidBizibleCollects data on visitors' preferences and behaviour on the website - This information is used make content and advertisement more relevant to the specific visitor. 1 yearHTTP_clskMicrosoftRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. 1 dayHTTP_fbp Meta Platforms, Inc.Used by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers.3 monthsHTTP_gcl_auGoogleUsed by Google AdSense for experimenting with advertisement efficiency across websites using their services. 3 monthsHTTP_gd_sessionj.6sc.coCollects visitor data related to the user's visits to the website, such as the number of visits, average time spent on the website and what pages have been loaded, with the purpose of displaying targeted ads.1 dayHTTP_gd_visitorj.6sc.coCollects visitor data related to the user's visits to the website, such as the number of visits, average time spent on the website and what pages have been loaded, with the purpose of displaying targeted ads.2 yearsHTTP_mkto_trkMarketoContains data on visitor behaviour and website interaction. This is used in context with the email marketing service Marketo.com, which allows the website to target visitors via email. 2 yearsHTTP_uetsidMicrosoftCollects data on visitor behaviour from multiple websites, in order to present more relevant advertisement - This also allows the website to limit the number of times that they are shown the same advertisement. 1 dayHTTP_uetvidMicrosoftUsed to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences. 1 yearHTTPi/adsct [x2]Twitter Inc.The cookie is used by Twitter.com in order to determine the number of visitors accessing the website through Twitter advertisement content. SessionPixelmuc_adsTwitter Inc.Collects data on user behaviour and interaction in order to optimize the website and make advertisement on the website more relevant. 400 daysHTTPdtSaGartnerCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner.SessionHTMLLAST_RESULT_ENTRY_KEYYouTubeUsed to track user’s interaction with embedded content.SessionHTTPLogsDatabaseV2:V#||LogsRequestsStoreYouTubePendingPersistentIDBnextIdYouTubeUsed to track user’s interaction with embedded content.SessionHTTPremote_sidYouTubeNecessary for the implementation and functionality of YouTube video-content on the website. SessionHTTPrequestsYouTubeUsed to track user’s interaction with embedded content.SessionHTTPServiceWorkerLogsDatabase#SWHealthLogYouTubeNecessary for the implementation and functionality of YouTube video-content on the website. PersistentIDBTESTCOOKIESENABLEDYouTubeUsed to track user’s interaction with embedded content.1 dayHTTPVISITOR_INFO1_LIVEYouTubeTries to estimate the users' bandwidth on pages with integrated YouTube videos.180 daysHTTPVISITOR_PRIVACY_METADATAsecurityscorecard.comPending180 daysHTTPYSCYouTubeRegisters a unique ID to keep statistics of what videos from YouTube the user has seen.SessionHTTPyt.innertube::nextIdYouTubeRegisters a unique ID to keep statistics of what videos from YouTube the user has seen.PersistentHTMLytidb::LAST_RESULT_ENTRY_KEYYouTubeStores the user's video player preferences using embedded YouTube videoPersistentHTMLYtIdbMeta#databasesYouTubeUsed to track user’s interaction with embedded content.PersistentIDByt-remote-cast-availableYouTubeStores the user's video player preferences using embedded YouTube videoSessionHTMLyt-remote-cast-installedYouTubeStores the user's video player preferences using embedded YouTube videoSessionHTMLyt-remote-connected-devicesYouTubeStores the user's video player preferences using embedded YouTube videoPersistentHTMLyt-remote-device-idYouTubeStores the user's video player preferences using embedded YouTube videoPersistentHTMLyt-remote-fast-check-periodYouTubeStores the user's video player preferences using embedded YouTube videoSessionHTMLyt-remote-session-appYouTubeStores the user's video player preferences using embedded YouTube videoSessionHTMLyt-remote-session-nameYouTubeStores the user's video player preferences using embedded YouTube videoSessionHTML Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies. NameProviderPurposeExpiryTypece_localstorage_testsecurityscorecard.comPendingPersistentHTMLtuida.usbrowserspeed.comPending1 yearHTTP_pendo_guides_blocked.c18819ef-f185-46a7-6c2f-59bf376fc654PendoPendingPersistentHTML_pendo_meta.01234567-89ab-cdef-0123-456789abcdefPendoPendingPersistentHTML_pendo_visitorId.c18819ef-f185-46a7-6c2f-59bf376fc654PendoPendingPersistentHTML_lbvisitedcdn-app.pathfactory.comPendingPersistentHTML_lbvisitedcountcdn-app.pathfactory.comPendingPersistentHTMLspBeaconPreflight_jukeboxTracker_jukeboxTrackercdn-app.pathfactory.comPendingSessionHTMLspBeaconPreflight_jukeboxTracker_railsTrackercdn-app.pathfactory.comPendingSessionHTMLlastExternalReferrer Meta Platforms, Inc.PendingPersistentHTMLlastExternalReferrerTime Meta Platforms, Inc.PendingPersistentHTMLcapterra_tracker.gifCapterraPendingSessionPixel__q_state_596DnzD85Gz1Abe4js.qualified.comPending10 yearsHTTP_pf_id.2350cdn-app.pathfactory.comPending2 yearsHTTP_pf_ses.2350cdn-app.pathfactory.comPending1 dayHTTPMetadata_session_idcdn.metadata.ioPending1 dayHTTPMetadata_visitor_idcdn.metadata.ioPending1 yearHTTPva_sidenav_opensecurityscorecard.comPending1 yearHTTP [#IABV2_LABEL_PURPOSES#] [#IABV2_LABEL_FEATURES#] [#IABV2_LABEL_PARTNERS#] [#IABV2_BODY_PURPOSES#] [#IABV2_BODY_FEATURES#] [#IABV2_BODY_PARTNERS#] Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages. You can at any time change or withdraw your consent from the Cookie Declaration on our website. Learn more about who we are, how you can contact us and how we process personal data in our Privacy Policy. Please state your consent ID and date when you contact us regarding your consent. Cookie declaration last updated on 05.10.23 by Cookiebot Scroll Top * Support * Login * Contact * Blog * Support * Login * Contact * Blog * Products PRODUCTS * Security Ratings Identify security strengths across ten risk factors. * Threat and Risk Intelligence Get actionable, data-based insights. * Security Questionnaires Automate security questionnaire exchange. * Attack Surface Intelligence NEW On-demand contextualized global threat intelligence. * Automatic Vendor Detection Uncover your third and fourth party vendors. * Cyber Risk Quantification Translate cyber risk into financial impact. * Reporting Center Streamline cyber risk reporting. * SecurityScorecard Marketplace Discover and deploy pre-built integrations. BUY NOW * Compare Plans Choose a plan that's right for your business. * Try It Free Evaluate the platform – free for 14 days. * Request a Demo See the platform capabilities in action. * Contact Us Contact us with any questions. * Locate a Partner Access our industry-leading partner network. icon__SSClogoMark icon__SSClogoMark Understand and reduce risk with SecurityScorecard. Start Free Trial * Services SERVICES NEW * Digital Forensics & Incident Response Prepare to respond to any threat. * Third-Party Risk Management Reduce risk across your vendor ecosystem. * Cyber Risk Intelligence Partner to obtain meaningful threat intelligence. * Penetration Testing Uncover your vulnerabilities before an attack does. * Red Team Use scenarios to perform a simulated attack. * Tabletop Exercises Test your incident response plan & bolster your readiness. UNDER CYBER ATTACK? Contact us for immediate support if you believe your organization is the victim of a cyber attack. Contact Cyber 911 Team * Solutions BY USE CASE * Compliance * Cyber Insurance * Digital Forensics * Due Diligence * Enterprise Cyber Risk * Executive-Level Reporting * Incident Response * Regulatory Oversight * Third-Party Risk BY INDUSTRY * Critical Infrastructure * Enterprise * Financial Services * Public Sector * Healthcare * Insurance * Retail & Consumer * Technology HELP YOUR ORGANIZATION CALCULATE ITS RISK View All Solutions * Customers OUR CUSTOMERS * Customer Overview Trusted by companies of all industries and sizes. * Peer Reviews Find out what our customers are saying. SUCCESS AND SUPPORT * Customer Success Receive award-winning customer service. * Support Get your questions answered by our experts. COMMUNITY * SecurityScorecard Connect Engage in fun, educational, and rewarding activities. * Connect Login Join our exclusive online customer community. icon__SSClogoMark icon__SSClogoMark UNDERSTAND AND REDUCE RISK WITH SECURITYSCORECARD. Free account sign up * Partners PARTNER PROGRAM OVERVIEW Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business. Learn more * Locate a Partner Access our industry-leading partner network. * Value-Added Resellers Enter new markets, deliver more value, and get rewarded. * Managed Service Providers Meet customer needs with cybersecurity ratings. * ISAC Partner Program Learn more about the industries we support and ISAC member benefits. * Technology Alliances Access innovative solutions from leading providers. * SCORE Portal Login Use the SCORE Partner Program to grow your business. * SecurityScorecard Marketplace Find a trusted solution that extends your SecurityScorecard experience. Understand and reduce risk with SecurityScorecard. Free account sign up * Resources RESOURCES * Resource Center Explore our cybersecurity ebooks, data sheets, webinars, and more. * SecurityScorecard Blog Read the latest blog posts published weekly. * Research & Insights Center Access our research on the latest industry trends and sector developments. * SecurityScorecard Academy Complete certification courses and earn industry-recognized badges. * Learning Center Discover in-depth insights, real-world examples, and cybersecurity best practices. TOOLS AND DOCUMENTATION * Product Release Notes Visit our support portal for the latest release notes. * CVE Details NEW View our database of security vulnerabilities. * Chrome Extension Show the security rating of websites you visit. * Assessments ROI Calculator Calculate the ROI of automating questionnaires. TRUST BEGINS WITH TRANSPARENCY. TAKE A LOOK AT THE DATA THAT DRIVES OUR RATINGS. Learn more * Company WORKING AT SECURITYSCORECARD Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it. Join our team * About Us SecurityScorecard is the global leader in cybersecurity ratings. * Leadership Meet the team that is making the world a safer place. * Press Explore our most recent press releases and coverage. * Events Join us at any of these upcoming industry events. * Policy Insights Raising the bar on cybersecurity with security ratings. * Careers APPLY TODAY Come join the SecurityScorecard team! * Contact Us Contact us with any questions, concerns, or thoughts. * Trust Portal Take an inside look at the data that drives our technology. * Help Center We are here to help with any questions or difficulties. * Pricing Request a demo RESEARCH & INSIGHTS CENTER CYBER RISK INTELLIGENCE UPDATE: HACKTIVIST INVOLVEMENT IN ISRAEL-HAMAS WAR REFLECTS POSSIBLE SHIFT IN THREAT ACTOR FOCUS The SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has continued its monitoring of threat actors involved in the war between Israel and Hamas and has integrated this monitoring into its ongoing deep and dark web (DDW) collections. KEY TAKEAWAYS Analysis of these collections appears, as of October 20, to support the following conclusions: * Relatively low-sophistication hacktivist groups, motivated mainly by attention, have remained the most prominent cyber actors involved in the conflict. * These groups’ recent message histories suggest that some of the most prominent groups’ targeting of organizations in Israel may have slowed somewhat after an initial period in approximately the first week of the war (October 7-14) in which they circulated a notably high volume of claims of attacks against Israeli organizations. * Some groups have claimed no new attacks, while others appear to have focused more on targets outside Israel. The group-specific findings listed below are also discussed at greater length in the appendices following the conclusion of this update. * The Persian-language, pro-Palestinian hacktivist channel Solomon’s Ring has not claimed an attack since October 8. * KillNet Palestine (whose name suggests it is a Palestine-based or especially pro-Palestinian affiliate or sub-group of the Russian hacktivist group KIllNet) has posted no new content since the message announcing its channel’s foundation on October 13. * The most recent claims of some groups, including both Cyber Av3ngers (a hacktivist group believed to act in support of Iranian interests) and the purportedly Palestinian Electronic_Tigers_Unit, are both non-specific and unsubstantiated. * The pro-Palestinian, Arabic-language Force Electronic Quds channel has most recently highlighted its defensive capabilities rather than claiming attacks. * Two of the three attacks the self-described “Yemeni Hackers” 1915 Team claimed on October 20 targeted Indian organizations. * On October 15, Anonymous Sudan began claiming attacks against Kenyan targets in response to the Kenyan government’s support for Israel. * Dark Storm Team’s most recent claim (October 18) was against Snapchat. * KillNet’s most recent claim (made on October 14) was against a Ukrainian energy company. Claims of attacks against Israeli targets have not, of course, stopped entirely. * Anonymous Sudan claimed a DDoS against RedAlert (an Israeli missile attack alerting app targeted earlier in the conflict) on October 20. * Ghosts of Palestine claimed attacks against Israeli government sites on October 19 and 20. * The Moroccan Black Cyber Army claimed an attack against an Israeli gaming site and a theft of sensitive Israeli documents on October 20. * The pro-Palestinian Muslim Cyber Army claimed one of the same attacks as Ghosts of Palestine on October 19 and it claimed a breach of Israeli citizens’ personal data on October 20. * The long-standing Turkish hacktivist group AslanNeferler Tim claimed attacks against an Israeli weapons manufacturer on October 19 and the Israeli Air Force on October 15. * SS Cyber Team made unsubstantiated claims of access to an Israeli database on October 17. * As with the Muslim Cyber Army’s claim, this breach is unconfirmed and may simply re-circulate data exposed prior to the war. CONCLUSION While the claimed targeting of non-Israeli organizations is not a novel dimension of the cyber activity that has accompanied this war, its persistence appears noteworthy, especially when considered alongside the apparent decrease in some groups’ targeting of Israeli organizations. While the ground war continues to present risks of regional escalation, the recent attacks against Kenyan and Indian organizations illustrate just how far beyond the region the cyber conflict has already expanded. APPENDICES: GROUP-SPECIFIC FINDINGS KILLNET Killnet’s most recently claimed attack occurred on October 14 and targeted a Ukrainian energy company. Given that KillNet has operated in support of Russian geopolitical interests for much of its history,and focused on targets related to the war in Ukraine for much of that history, this may reflect a return to form for the group. Image 1: KillNet’s most recent attack claim, an attempt against a Ukrainian energy company on October 14. KILLNET PALESTINE The Palestine-specific KillNet channel KILLNET PALESTINE was created Oct. 13, but as of October 20, has posted no new messages since then. Image 2: KILLNET PALESTINE’s only post SOLOMON’S RING This Persian-language, pro-Palestinian (and presumably Iranian) hacktivist group has been active since October 2022 and circulated its most recent claim regarding an attack (an unsupported claim to have stolen data from an “important Israeli data center”) on October 7, 2023. Image 3: On October 7, Solomon’s Ring posted, “By Divine Power and Strength, one of Israel’s important data centers was hacked by the Solomon’s Ring hackers. Information is currently being downloaded. All of the data will be published shortly.” As of October 20, the group has not circulated the data it claimed to be downloading on October 7 or provided other evidence that it compromised an Israeli data center. Indeed, it has not posted new content of any sort since October 11. DARK STORM TEAM Despite its avowed pro-Palestinian stance, Dark Strom [sic] Team has claimed attacks on targets—both inside Israel and out—throughout its history, and appears to have commercial motivations in addition to political ones. These aspects of its history suggest an outlook similar to KillNet’s. The channel was created on August 18, 2023 and claimed its attack, which focused on Israel, on August 21. Image 4: Dark Storm Team’s first attack targeted an Israeli hospital. With the start of the current war, the group targeted the Israeli government and sensitive industries in a series of claims on October 8 and 9. Images 5-6: The group claimed attacks against an Israeli municipality and alerting company early in the current conflict. However, on October 15, the group claimed a DDoS attack against John F. Kennedy International Airport (JFK) in New York on the grounds that it is “the most welcoming airport for the Zionist entity.” Image 7: Dark Strom Team claimed an attack against JFK airport on October 15. This attack appears to prefigure an October 17 declaration that the group would target any entity perceived to support Israel. Image 8: The group declared it would target “any country…that supports the occupying entity” on October 17. As of October 20, the most recent attack claim circulated by the channel was of an attempt against Snapchat on October 18, which may speak to the group’s international focus. Image 9: Dark Strom Team claimed a disruption to Snapchat on October 18. Closer study of the group’s history suggests that its motivations may be less strictly pro-Palestinian than they initially appear. Despite its declared sympathies with the Palestinian cause, it also advertises DDoS-as-a-service and commercial malware offerings, while also claiming attacks outside of Israel. This may simultaneously serve to bolster the group’s reputation (and thus drive business) and reflect a pro-Russian geopolitical orientation. Indeed, the channel’s most recent messages additionally suggest that the group’s financial motivations have remained strong, despite the outbreak of the war. As of October 20, the six most recent messages displayed in the channel have all been advertisements. Images 10-11: Dark Strom Team’s most recent posts advertised cybercrime-as-a-service and commercial malware offerings. These recent posts resemble earlier ones that also suggested financial motivations. The group offered a discount on its services on September 16 and circulated a “menu” of hacking services on September 22: Images 12-13: Pre-war posts by Dark Strom Team reflect financial motivations. The group’s long history of targeting entities outside of Israel may reflect attempts to build a reputation for commercial purposes, but may also suggest a broader anti-NATO (and therefore possibly pro-Russian) geopolitical outlook instead of a strictly pro-Palestinian one. The group claimed an attack against another U.S. airport’s website before the start of the war, and made no mention of American support for Israel when claiming the attack. Image 14: the group claimed a previous attack against Los Angeles Airport on September 11. This may suggest that the group’s activities have been less uniquely focused on the Palestinian cause than they initially appeared and may offer a point of comparison between Dark Strom Team and KillNet, which has also attempted attacks against US airports. And even though the group’s messaging focuses on the Palestinian cause, it may (like KillNet and Anonymous Sudan) act in support of Russian geopolitical interests. For much of its history, it has targeted NATO member states and others that have declared their support for Ukraine. One of the group’s first attacks on August 23 targeted Denmark, a September 10 attack targeted the Netherlands, and Dark Strom Team stated its intent to launch further attacks against NATO on September 14. Images 15-17: The group has previously declared its intent to attack NATO-affiliated targets. Taken together, the group’s cybercrime-as-a-service offerings and stated hostility to NATO suggest a profile similar to KillNet. Though it seemed to have strictly financial motivations at the time of its founding as a DDoS-as-a-Service group, it appears to have acquired more explicitly political motivations since the outbreak of the war between Russia and Ukraine. Subsequently, it has claimed a wide variety of attacks against entities in NATO member states. 1915 TEAM 1915 Team circulated images of a supposed leak of an Israeli military spokesperson’s personal data on October 20. The image may, however, be fabricated or the data may be outdated, as the image features a password dating back to 2019. Image 18: The “Yemeni Hackers” of the 1915 Team circulated images purporting to contain an Israeli military spokesperson’s personal data on October 20. Before that, the most specific claim they made regarding cyber activity was an October 11 announcement that they would launch ransomware attacks against Israel. However, these claims remain unsubstantiated as of October 20. Image 19: 1915 Team previously shared claims of new ransomware attacks against Israeli and allied targets on October 11. ELECTRONIC_TIGERS_UNIT The Electronic_Tigers_Unit describes itself as a politically independent group of cyber actors committed to defending Muslims and resisting Israel. Its most recent post was on October 18, but its most recent claims of specific cyber activity occurred two days prior. On October 16, it circulated unsubstantiated claims of access to Israeli supervisory control and data acquisition (SCADA) systems and other critical infrastructure. Image 20: Electronic_Tigers_Unit shared claims of access to Israeli infrastructure on October 16. However, the video the group shared in support of these claims may not indicate access to uniquely sensitive systems specifically located in Israel; the only support for the claim is the video’s use of satellite imagery of a location in Israel sourced from Google Maps: Image 21: Electronic_Tigers_Unit shared images apparently originating from Google Maps to support its claims of access to sensitive Israeli targets. On the same date, the group also claimed access to Israeli police data but offered little evidence to support the claim. Image 22: Electronic_Tigers_Unit also claimed access to Israeli police data on October 16. FORCE ELECTRONIC QUDS The most recent claims made on the pro-Palestinian, Arabic-language channel Force Electronic Quds (a literal, if somewhat unnatural, English rendering of its Arabic name, فليق القدس الاكتروني; “the Electronic Quds Force” would be the more likely word order in English) have highlighted the group’s defensive capabilities rather than claimed attacks against Israel, as indicated by two posts made on October 16: Image 23: In one of its October 16 posts, Force Electronic Quds wrote, “We are in the line of fire in this battle, and we emphasize that we have new methods, not only methods of electronic attacks on Zionist targets but [also] defensive methods that counter the work of the failed Zionist intelligence system.” Image 24: in another of its posts on October 16, Force Electronic Quds claimed, “We thwarted a large number of failed attempts by the Zionist intelligence system to hack the phones of Palestinian citizens in the Gaza Strip, as our defensive methods are highly successful.” ASLAN NEFERLER TIM The long-standing Turkish hacktivist group Aslan Neferler Tim’s most recently-claimed attack came on October 19, when it purportedly disrupted the operations of an Israeli arms company’s website. Image 25: Aslan Neferler Tim claimed to have interrupted the service of Israel Weapon Industries (IWI)’s website on October 19. Prior to the claimed attack against Israel Weapon Industries (IWI), Aslan Neferler Tim similarly claimed to have disrupted the Israeli Air Force’s website on October 15: Image 26: Aslan Neferler Tim claimed an attack against the Israeli Air Force on October 15. ANONYMOUS SUDAN Anonymous Sudan claimed attacks against Israeli alerting app RedAlert’s website on October 20. However, these claims would not necessarily indicate that the attack affected the alerting service itself, given that the alerting application and website likely use different infrastructure. However, especially given previous attacks against the same service earlier in the conflict, these claims, if circulated widely enough, could still have a psychological effect. Image 27-28: Anonymous Sudan claimed to have disrupted the operations of RedAlert’s website, despite its geographically-specific traffic restrictions, on October 20. Notably, however, before October 20, Anonymous Sudan’s most recent claims occurred on October 15, when the group declared it would target Kenyan organizations due to Kenya’s support for Israel—this may speak to the growing international scope of the cyber conflict. Images 29-30: Anonymous Sudan claimed attacks against the Kenyan rail service on October 15. GHOSTS OF PALESTINE Ghosts of Palestine’s focus has remained on Israeli targets. The group most recently claimed an attack against govforms.gov[.]il on October 20 and claimed attacks against the Israeli Ministry of Education one day prior. Images 31-32: Ghosts of Palestine claimed attacks against an Israeli government site on October 20 and an attack against the Israeli Ministry of Education on October 19. MOROCCAN BLACK CYBER ARMY Similarly, the Moroccan Black Cyber Army’s most recent claims are of a DDoS attack against an Israeli gaming site and a theft of sensitive Israeli documents on October 20. Images 33-34: The Moroccan Black Cyber Army made unsubstantiated claims of attacks against Israeli organizations on October 20. CYBER AV3NGERS The Iran-linked Cyber Av3ngers hacktivist group claimed an attack on Israeli electric infrastructure on October 17. However, no public reporting supports this claim. Image 35: Cyber Av3ngers made unsubstantiated claims of a disruption to Israeli energy infrastructure on October 17. SS CYBER TEAM The openly anti-Semitic SS Cyber Team most recently made an unsubstantiated claim to have breached Israeli databases on October 17. Image 36: SS Cyber Team circulated the contents of purportedly breached Israeli databases on October 17. MUSLIM CYBER ARMY Like Ghosts of Palestine, the Muslim Cyber Army claimed the October 19 attack against the Israeli Ministry of Education. More recently, the group claimed data thefts on October 19 and 20. The images circulated in support of these claims, however, may either be forged or taken out of context, and could contain data exposed prior to the war. Images 37-39: The Muslim Cyber Army made unsubstantiated claims of attacks and data thefts against Israeli targets on October 19 and 20. RELATED ARTICLES A DETAILED ANALYSIS OF THE MONEY MESSAGE RANSOMWARE The threat actor group, Money Message ransomware, first appeared in March 2023, demanding million-dollar ransoms from its targets. Its configuration, Read More » 09/14/2023 DORA: A JOURNEY TO CYBER RESILIENCE DORA’s Pillars of Transformation Included in DORA are five key pillars that will shape how financial services organizations manage Information Read More » 09/07/2023 DIGITAL FORENSICS & INCIDENT RESPONSE DATASHEET Be prepared to respond to any threat right away with guaranteed support. Read More » 09/07/2023 Return to RESOURCES Products Solutions Customers Marketplace Partners Resources Company Trust Portal Security Ratings Login Blog Contact Careers SecurityScorecard Tower 49 12 E 49th St Suite 15-100 New York, NY 10017 info@securityscorecard.io United States: (800) 682-1701 International: +1(646) 809-2166 Social-linkedin Social-facebook Twitter Instagram Youtube * Terms of Use * Privacy Policy * Patents * Cookies © 2022 SecurityScorecard