www.jpost.com
Open in
urlscan Pro
2600:9000:223e:6a00:4:69bf:5d00:93a1
Public Scan
URL:
https://www.jpost.com/international/is-iran-behind-the-black-shadow-attacks-and-does-it-matter-684266
Submission: On November 08 via api from GB — Scanned from GB
Submission: On November 08 via api from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Coronavirus Israel News WORLD NEWS Middle East U.S. Politics ARCHAEOLOGY Opinion PODCAST Login Log Out Aliyah Judaism Kabbalah Health & Wellness Antisemitism Israel Real Estate Law JP Must Premium Pfizer News Advertisement Jerusalem Post World News IS IRAN BEHIND THE BLACK SHADOW ATTACKS AND DOES IT MATTER? THE LATEST ATTACK WAS ANNOUNCED BY THE GROUP LAST FRIDAY, WITH BLACK SHADOW CLAIMING IT HAD DAMAGED CYBERSERVE’S SERVERS. By TZVI JOFFRE Published: NOVEMBER 7, 2021 12:49 Updated: NOVEMBER 7, 2021 18:11 A hacker is being depicted in this illustrative photo (photo credit: Courtesy) Advertisement As the Black Shadow hacker group announced its latest attack in recent days, the company involved was quick to point the finger at Iran, as other victims of the group had done in past attacks, but is Iran really the culprit in this case? “Black Shadow is pure and simple financial attacks,” said Zohar Pinhasi, the CEO of the cybersecurity firm Monstercloud CEO to The Jerusalem Post. “Anybody can come up with a claim saying that this group came from this country, that group came from another country. It takes years of investigation [to locate these groups] and in some cases it is impossible.” Pinhasi pointed to the case of an extremely active hacker group called SamSam which was eventually found to be run by Iran-based hackers after operating for a number of years, stressing that it took years for authorities to track down the cybercriminals, and even then it was only able to track them down after the hackers made a mistake and left a lead. LATEST ARTICLES FROM JPOST PLAY Top Articles Video Settings Full Screen About Connatix V136947 Read More Read More Read More Read More Read More Read More Mossad thwarts Iranian attacks on Israelis in Africa‑ report 1/1 Skip Ad Continue watching IDF's new arsenal: More munitions, precise missiles, greater firepower after the ad Visit Advertiser website GO TO PAGE “They can say this country or another, but no one really knows where they are,” added Pinhasi about the Black Shadow attacks. “It is really rare that you find an event by INTERPOL or the FBI that they do a massive takedown, not just in the digital world but in the physical world, to the point where they are actually arresting people. It is very hard to locate those individuals.” Einat Meyron, a cybersecurity consultant, expressed agreement that it was unlikely that the group’s identity was known yet, stating that “first off, in this kind of attack, the identity of the attacking group is less important,” adding that the targeted companies find it important to attribute these attacks to Iran for “insurance and reputation reasons.” “In practice, whether it is Iranians or Swiss people, there is no need to make it easier for the attackers by refraining from exercising basic defenses and acting with the mindset that it will not happen or that in the worst case the state will help.” VISUAL DEPICTION OF A HACKER (credit: VIA WIKIMEDIA COMMONS) Meyron stressed that even if the hackers live in Iran, it is “necessary to prove beyond any doubt that this is a group that operates on an Iranian mission and is not just associated with the country. This proof in itself is not trivial because of the spoofing effect well-known in the world of intelligence and usually identified with Russia.” The cybersecurity consultant added that it is unlikely a group working for the Iranian regime would “waste energy” on records from random sites and would instead aim to cause significant infrastructure damage, even if it was more complex and took longer. “On the other hand,” said Meyron, “we must not forget that there is always the possibility that the Black Shadow activity is a smokescreen for much higher quality and much deeper activity, whether as a deliberate proxy or as a spoofing proxy of other attack groups.” Black Shadow’s most recent attack targeted the web hosting company Cyberserve, leaking data from the gay dating app Atraf, the Dan bus company, 103FM radio, the Trip Guaranty travel insurance company, and the Mor Institute for medical data, among others. The leaked data includes flight details, addresses, emails, phone numbers, HIV status and birth dates, among other personal details. The latest attack was announced by the group last Friday, with Black Shadow claiming it had damaged Cyberserve’s servers. Black Shadow is responsible for previous attacks against Israeli companies, such as vehicle insurance company Shirbit and finance company KLS. In those attacks, the companies affected claimed that the group was Iranian, despite cybersecurity experts rejecting the claims. The latest Black Shadow attacks came not long after the Moses Staff hacker group appeared for the first time, as it leaked photos and documents from an alleged cyberattack on the Defense Ministry. Since first appearing, Moses Staff has claimed that it has successfully conducted a cyberattack on three Israeli engineering companies and the offices of tax processing companies. The data leaked include projects, ID cards, tax documents, maps, contracts, pictures, letters and videoconferencing images. Recommended by Unlike Black Shadow, Moses Staff has not made any demands for money or anything else. Moses Staff’s website claims that the group has hacked over 165 servers and 254 websites and compiled over 11 terabytes of data, including Israel Post, the Defense Ministry, files related to Defense Minister Benny Gantz, the Electron Csillag Company and Epsilor. Concerning whether the Moses Staff hackers are actually a new group, Pinhasi stated that hacker groups often wear multiple hats, meaning that the group may be older than it seems, but may have used a different name in the past. Pinhasi added, however, that it is still too early to know if Moses Staff or Black Shadow are just different names for another group, and that Monstercloud is collecting cyber intelligence around the attacks in order to protect its customers. The Monstercloud CEO pointed to how ransomware attacks have changed, saying that while in the past, victims of these attacks would either pay or not pay and that would be the end of it, in recent years, hackers have started conducting so-called doxware attacks, threatening to leak data if they are not paid. “With that said, paying the ransom, or paying at all, against doxware, does not guarantee anything,” stressed Pinhasi. “Because we have had cases where the victim paid and his data was exposed regardless.” Cyber Hackers (credit: REUTERS) Pinhasi added however that theory is theory and reality is reality. “Think about it this way. If you have a company with 50 employees, you have worked since the age of 25, you built a company, you invested your blood, sweat and tears in that company. One day you wake up in the morning, nothing. You can’t even gain access physically to the office because your fobs are not working. Now tell me, the person on the other side wants $100,000. Would you close the company and say ‘ah, everyone says don’t pay I’m just going to drop everything?’ There’s reality involved in this kind of situation.” Pinhasi added that cyberattacks happen in Israel on a daily basis, but just are not publicized because “no company wants to expose themselves.” “In Israel, there were multiple attacks against major companies in the public sector along with government agencies that were attacked in successful attacks that you have not heard on the news,” said Pinhasi. “If you had a company with 100 employees, would you go out in public and say ‘we got hacked and all the information of our customers is currently at risk’? You don’t want to do that.” Pinhasi stated that, at the end of the day, the responsibility for attacks lies on companies themselves, not the government. “If the local IT guy or the company which services the customer that got attacked are not doing their job and they are leaving everything exposed or they’re not monitoring the network from a security standpoint, the government has a limit to what it can do. At the end of the day, security falls on the company.” The Monstercloud CEO stated that most attacks occur due to human errors by companies and their IT staff, who often think that while vulnerabilities exist, attacks they hear about in the news will not happen to them. “There are other things that can cause this type of attack, but most of the attacks that we see are caused by lack of knowledge from the IT person, lack of knowledge from the IT company, on how to maintain proper security. That is what those criminals are riding on.” “Don’t just invest in sophisticated hardware and software,” advised Pinhasi. “You need to invest in people, in the IT guy, send him to some courses that can enrich his knowledge in security. In the past, you could just hire an IT guy. Today he needs to have some kind of security background.” Meyron added that Black Shadow’s method of operation provided a great opportunity for everyone to learn a little more about how cyberattacks work, knowledge which was not so widespread up until recent years. “The ability to create an agenda through sarcastic messages that create in us a need for an almost Pavlovian response that provides the attitude they expect and even more so at a time convenient to them, but less convenient for Israeli citizens, [such as] weekends, holidays [or] late-night hours, is one of the pressuring tactics that hackers routinely apply and in this case are exposed to us in a completely transparent way,” said Meyron. Tags cyber security hacker Black Shadow Sign up for The Jerusalem Post Premium Plus for just $5 Upgrade your reading experience with an ad-free environment and exclusive content Join Now > Advertisement You Might Also Like * More People Switching to VoIP Phones (Take a look at the Prices) VOIP | Search Ads * This Portable Heater Might Be The Least Expensive Heating… OrbisHeater * Cosmetics: Health and transparency go together * [Pics] We Dare You Not To Laugh At These Vacation Pictures Gloriousa * China has the world's largest navy, third-largest air force - report * Leaders of anti-Zionist cult Lev Tahor to stand trial in New York Popular in the Community Skip Ads by * * * * * * * * * Two rabbis tie the knot in LGBTQ+ conservative Jewish… * £85 – Harrogate getaway with meals, save up to 42% Travelzoo * [Pics] Here’s What 30 Historical Figures Actually Looked Like Gloriousa * Revolutionary FFP2 Mask just launched in the UK. What… Urban24News * Democratic New Jersey Governor Phil Murphy wins… * Women of Rojava, Kurdish Syria suffering in the shadow of war * Israeli documentary shows delusions of 'Hitler's architect' * [Gallery] Tattoo Fails: Try Not To Laugh Too Hard At No. 6 History A2Z * Woman pushed off balcony can't return to Israel to testify * UK Doctor: How To Clean Out Entirely Your Bowels Gut Solution * [Pics] 67 Colorized Photos Captured Way More Than… Studentsea * [Gallery] The Most Historically Accurate Movies, Ranked History A2Z * What was the point of Iran’s 'fake news' IRGC ship raid? Subscribe for our daily newsletter By subscribing I accept the terms of use and privacy policy Hot Opinion ISRAEL MUST STAND STRONG AGAINST REOPENING OF US CONSULATE - EDITORIAL By JPOST EDITORIAL IS BENJAMIN NETANYAHU'S POLITICAL CAREER OVER? - OPINION By YAAKOV KATZ MY WORD: A CHANGE IN CLIMATE By LIAT COLLINS BY SHUNNING COP26, RUSSIA AND CHINA COULD DOOM US ALL By AMOTZ ASA-EL COP26: A CLIMATE CARNIVAL TO REMEMBER AND RIDICULE - OPINION By RUTHIE BLUM Advertisement Might Interest You Most Read 1 ASTEROID THE SIZE OF EIFFEL TOWER HEADING FOR EARTH IN DECEMBER 2 ASTEROID SKIMMED PAST EARTH AND NO ONE SAW IT COMING 3 ARAVRIT - NEW APP DESIGNS SCRIPT THAT COMBINES HEBREW AND ARABIC 4 NASA SCIENTIST ANSWERS: WHEN WAS THE LAST TIME AN ASTEROID HIT EARTH? 5 DRILL FOR 2,000 ROCKETS A DAY AND INTERNAL STRIFE: IDF PREPS FOR WAR REPORTERS' TWEETS Read all Tweets > Advertisement Information About Us Contact us Feedback Advertise with Us Terms Of Service Privacy Policy Subscriber Agreement JPost Jobs Cancel Subscription Sitemap פרסום בג'רוזלם פוסט Customer Service The Jerusalem Post Group Breaking News Iran News Coronavirus World News JPost NY Conference Diplomatic Conference IvritTalk- Free trial lesson The Jerusalem Report Jerusalem Post Lite March of the living Kabbalat Shabbat Shapers of Israel Maariv Online Maariv News Tools and services JPost Premium Ulpan Online JPost Newsletter JPost News Ticker Our Magazines Learn Hebrew RSS feed JPost.com Archive Digital Library Promo Content Special Content Sites Of Interest Jewish Broadcasting Service Jerusalem Hotels KKL-JNF Poalim Online The Jerusalem Post Customer Service Center can be contacted with any questions or requests: Telephone: *2421 * Extension 4 Jerusalem Post or 03-7619056 Fax: 03-5613699 E-mail: subs@jpost.com The center is staffed and provides answers on Sundays through Thursdays between 07:00 AM and 14:00 PM and Fridays only handles distribution requests between 7:00 AM and 12:30 PM For international customers: The center is staffed and provides answers on Sundays through Thursdays between 7AM and 14PM Israel time Toll Free number 1-800-448-9291 Telephone +972-3-761-9056 Fax: 972-3-561-3699 E-mail: subs@jpost.com Copyright © 2021 Jpost Inc. All rights reserved • Terms of Use • Privacy Policy Designed by SIGN UP Get news, tips and tricks to encourage healthy ♦Eating ♦Exercising ♦Relationships ♦Lifestyles delivered to your inbox A message from editor Yaakov Katz High-quality journalism is needed today more than ever as Israel continues to face increasing threats and challenges in the Middle East alongside domestic political instability. Click here to support us To keep providing you with reliable and trustworthy information, we need your support. Become a Premium Plus subscriber today, enjoy an ad-free experience and help us continue telling Israel’s story to the world.