<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Palestine &#8211; @Forensicxs</title>
	<atom:link href="https://www.forensicxs.com/tag/palestine/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.forensicxs.com</link>
	<description>Ethical Hacking &#124; Cybersecurity</description>
	<lastBuildDate>Mon, 27 Dec 2021 14:58:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Israel and the Web</title>
		<link>https://www.forensicxs.com/israel-and-the-web/</link>
					<comments>https://www.forensicxs.com/israel-and-the-web/#respond</comments>
		
		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Sun, 23 May 2021 20:03:07 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[1km.co.il]]></category>
		<category><![CDATA[Beersheba]]></category>
		<category><![CDATA[Benjamin Netanyahu]]></category>
		<category><![CDATA[Bezeq]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[CyberArk]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[Hamas]]></category>
		<category><![CDATA[Hasadna]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[Imperva]]></category>
		<category><![CDATA[Isracoin]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Israel ID]]></category>
		<category><![CDATA[MedNautilus]]></category>
		<category><![CDATA[Mossad]]></category>
		<category><![CDATA[NSO]]></category>
		<category><![CDATA[Operation Wall Guardian]]></category>
		<category><![CDATA[Palestine]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Politibot]]></category>
		<category><![CDATA[PsyGroup]]></category>
		<category><![CDATA[Radware]]></category>
		<category><![CDATA[RedAlert]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Stuxnet]]></category>
		<category><![CDATA[Tamares]]></category>
		<category><![CDATA[Unit 8200]]></category>
		<category><![CDATA[Zero day]]></category>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=1585</guid>

					<description><![CDATA[In this article, I&#8217;m going to review the cyber footprint of Israel. It&#8217;s not going to be an easy task as Israel is one of the leaders in the field, so there is a lot to report. Let&#8217;s jump in this video to have a first overview of what Israel is doing in the field &#8230; <p class="link-more"><a href="https://www.forensicxs.com/israel-and-the-web/" class="more-link">Continue reading<span class="screen-reader-text"> "Israel and the Web"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>In this article, I&#8217;m going to review the <strong><span class="has-inline-color has-luminous-vivid-orange-color">cyber footprint of Israel</span></strong>. It&#8217;s not going to be an easy task as Israel is one of the leaders in the field, so there is a lot to report. Let&#8217;s jump in this video to have a first overview of what Israel is doing in the field</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="PRIME MINISTER NETANYAHU on CYBERSECURITY IN ISRAEL" width="525" height="295" src="https://www.youtube.com/embed/-O-J-Ni1txw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div><figcaption>PM Netanyahu introduction speech at CyberTech 2017 : a milestone</figcaption></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Israel in context</span></strong></p>



<p>Located in an area of recurring conflict, <strong><span class="has-inline-color has-luminous-vivid-orange-color">Israel faces many challenges in its surroundings</span></strong>, including but not limited to : Hezbollah (Lebanon) &amp; Iran, Hamas &amp; Palestine (Gaza strip, West bank), Golan Heights and its water supply,&#8230;the map below speaks for itself ! Israel is like a small island in a huge muslim area, with its capital, Jerusalem, playing a central role in Jewish, Christian, and Muslim religions. The dreaded Iran is not that far away, too</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="620" height="1024" src="https://www.forensicxs.com/wp-content/uploads/2021/04/large-detailed-political-and-administrative-map-of-israel-with-disputed-territories-620x1024.jpg" alt="" class="wp-image-1591" srcset="https://www.forensicxs.com/wp-content/uploads/2021/04/large-detailed-political-and-administrative-map-of-israel-with-disputed-territories-620x1024.jpg 620w, https://www.forensicxs.com/wp-content/uploads/2021/04/large-detailed-political-and-administrative-map-of-israel-with-disputed-territories-182x300.jpg 182w, https://www.forensicxs.com/wp-content/uploads/2021/04/large-detailed-political-and-administrative-map-of-israel-with-disputed-territories-768x1268.jpg 768w, https://www.forensicxs.com/wp-content/uploads/2021/04/large-detailed-political-and-administrative-map-of-israel-with-disputed-territories-931x1536.jpg 931w, https://www.forensicxs.com/wp-content/uploads/2021/04/large-detailed-political-and-administrative-map-of-israel-with-disputed-territories-1241x2048.jpg 1241w, https://www.forensicxs.com/wp-content/uploads/2021/04/large-detailed-political-and-administrative-map-of-israel-with-disputed-territories.jpg 1460w" sizes="(max-width: 620px) 100vw, 620px" /></figure>



<p>There is a long history of conflicts in the region, so it comes to no suprise that Israel has been looking to build <strong><span class="has-inline-color has-luminous-vivid-orange-color">a strong army</span></strong>, including an extensive cyber capability, to help foster its influence and resilience</p>



<p>Its cyber capability has been widely increased in the last years, but its roots are to be found in previous decades, as Israel did not wait the cyber hype, to start using electronic warfare in modern conflicts. It also used espionage at scale. The Mossad is famous for this</p>



<p>Some key figures are also to be considered : <strong><span class="has-inline-color has-luminous-vivid-orange-color">Israel is a small country in terms of population</span></strong></p>



<p>Only 9 Million people live in Israel, as compared, for example, to 83 Million people in Iran. So, for Israel &#8220;survival&#8221; on the international scene, it is absolutely necessary that they <strong><span class="has-inline-color has-luminous-vivid-orange-color">maintain a strong technology leadership</span></strong></p>



<p>Israel, for well known historical reasons, has also a strong international footprint (so called diaspora). This helps leverage a strong cybersecurity ecosystem with increased export possibilities</p>



<p>As a logical consequence of all this, Israel has a strong Internet penetration rate, including social networks. In fact, it is one of the highest in the world : <a href="https://bit.ly/3gGupSY" target="_blank" rel="noreferrer noopener">https://bit.ly/3gGupSY</a></p>



<p>Due to this strong exposure to the Web, come also additional <strong><span class="has-inline-color has-luminous-vivid-orange-color">risks to be attacked</span></strong>. We will see that later on in this article</p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">A unique cyber ecosystem</span></strong></p>



<p>To ensure the security of its country, Israel has put in place a mandatory military conscription for all citizens, male and women (duration is more than two years)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="576" src="https://www.forensicxs.com/wp-content/uploads/2021/05/F101027IDF03-1-e1481100913732.jpg" alt="" class="wp-image-1606" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/F101027IDF03-1-e1481100913732.jpg 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/F101027IDF03-1-e1481100913732-300x169.jpg 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/F101027IDF03-1-e1481100913732-768x432.jpg 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>This &#8220;people&#8217;s army&#8221; helps foster a <strong><span class="has-inline-color has-luminous-vivid-orange-color">Defense mindset</span></strong> inside the population (although Israel is considering a potential model change : <a href="https://bit.ly/3nBlSlR" target="_blank" rel="noreferrer noopener">https://bit.ly/3nBlSlR</a>)</p>



<p>Israel has also a <strong><span class="has-inline-color has-luminous-vivid-orange-color">strong culture of espionage and secret intelligence</span></strong>. Some of its highest leaders (Ehud Barak, Benyamin Netanyahu, Ytzhak Shamir, Ariel Sharon&#8230;) have been working in the past for secret intelligence services or special forces. In particular, the well known army unit 8200, focused on intelligence activities, is a booster for cyber and high tech companies : <a href="https://bit.ly/3eMh7BR" target="_blank" rel="noreferrer noopener">https://bit.ly/3eMh7BR</a></p>



<p>Fully aware of the importance of cyber in future military and intelligence operations, Israel has made everything possible to build a strong, <strong><span class="has-inline-color has-luminous-vivid-orange-color">state sponsored cybersecurity ecosystem</span></strong>, building synergies between Military Intelligence, Industry, Schools</p>



<p>Israel created the <strong><span class="has-inline-color has-luminous-vivid-orange-color">cyber park in Beersheba</span></strong>, having in one place, the Ben-Gurion university, a technology center with many companies, and the Israel Defense Forces (IDF) technology campus</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="475" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-1024x475.png" alt="" class="wp-image-1608" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-1024x475.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-300x139.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-768x357.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image.png 1441w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>As a consequence, the <strong><span class="has-inline-color has-luminous-vivid-orange-color">cyber companies in Israel cover most of the segments possible</span></strong> and in most cases, have success in Israel  but also internationally</p>



<p>Despite the COVID19 crisis, these cyber companies performed quite well, with ongoing investments, and the need for increased security from customers, due to the latest spate of cyber attacks and the new data protection regulations</p>



<p>A constant flow of startup companies is entering the Israeli cyber space. Here below some figures from 2017, found on <strong><span class="has-inline-color has-luminous-vivid-orange-color">Sartup Nation Central</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-80.png" alt="" class="wp-image-1790" width="513" height="302" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-80.png 716w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-80-300x177.png 300w" sizes="(max-width: 513px) 100vw, 513px" /><figcaption><a href="https://bit.ly/3uOaS7k" target="_blank" rel="noreferrer noopener">https://bit.ly/3uOaS7k</a></figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">YL Ventures</span></strong>, funding and supporting Israeli cybersecurity entrepreneurs &#8220;from seed to lead&#8221; has an open and live map of Israel’s cybersecurity startup landscape : <a href="https://www.cybermap.co/" target="_blank" rel="noreferrer noopener">https://www.cybermap.co/</a></p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Glilot Capital Partners</span></strong>, an Israeli Venture Capital firm specialized in cyber security, DevOps, and enterprise software, released its 2021 cybersecurity landscape in February 2021 : <a href="https://bit.ly/3aUT0Qi" target="_blank" rel="noreferrer noopener">https://bit.ly/3aUT0Qi</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="540" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-1-1024x540.png" alt="" class="wp-image-1610" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-1-1024x540.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-1-300x158.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-1-768x405.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-1-1536x810.png 1536w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-1.png 1647w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Let&#8217;s summarize</span></strong> as it is quite important for the remainder of the article :</p>



<ul class="wp-block-list"><li>Israel is in a semi permanent state of war, with a strong military and security culture among its population</li><li>It has several active enemies and foes</li><li>The cyber ecosystem is structured</li><li>It is usual to start working in the military forces, or intelligence agencies, and then go working for the private cyber sector</li><li>Israel is a small country by size, its public sector is therefore limited, and cyber companies will seek to export. Without this leverage it will be more difficult for them to survive</li><li>Private Cyber surveillance companies are doing this for profit. This could lead to unethical actions</li></ul>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Israel Internet structure</span></strong></p>



<p>Israel is connected abroad by three undersea cables : MedNautilus, owned by Telecom Italia, the Bezeq International Optical System, and Tamares Telecom&#8217;s submarine cable</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="704" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-5-1024x704.png" alt="" class="wp-image-1621" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-5-1024x704.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-5-300x206.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-5-768x528.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-5.png 1205w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>As of 2021, three additional submarine cables are planned : two as part of Cinturion&#8217;s Trans European Asia System (TEAS), connecting India, the Middle East and Europe, and one to connect Italy to India called Blue Raman, owned by Google and Telecom Italia. They land in the surroundings of Tel Aviv and Haifa</p>



<p>Submarine cables in the Middle East had been a touchy topic. Roughly explained, some Muslim countries did not want to share cables with Israel, so most traffic between Europe and Asia was going through  Egypt</p>



<p>The &#8220;normalization agreements&#8221; between Israel and UAE/Bahrain (<a href="https://bit.ly/3nGJgyr" target="_blank" rel="noreferrer noopener">https://bit.ly/3nGJgyr</a>) are opening the door for much improved deals in terms of Internet cables in the region, as <strong><span class="has-inline-color has-luminous-vivid-orange-color">new cables wanting to cross Israel for their Europe-Asia traffic will come in</span></strong></p>



<p>But, the geopolitical situation in the area has always been unstable with some spates of violence. We will see in the next years what happens with these normalization agreements and their consequences</p>



<p>Israel is already building a new fiber cable network, connecting Tel Aviv to the South of the country. This will lay the ground for new international cables</p>



<p>In addition to submarine cables, there is also a <strong><span class="has-inline-color has-luminous-vivid-orange-color">rise of activity in the buildout of new data centers</span></strong> in anticipation of Israel becoming the new Middle East hub (<a href="https://bit.ly/3ePaRt0" target="_blank" rel="noreferrer noopener">https://bit.ly/3ePaRt0</a>)</p>



<p>Having said that, is Israel having a good Internet network, as of today ? There are claims that the network lacks speed as compared to international standards, that Israel lags behind, even if it claims to be a &#8220;startup nation&#8221; : <a href="https://bit.ly/3vyyHQw" target="_blank" rel="noreferrer noopener">https://bit.ly/3vyyHQw</a></p>



<p>There are also accusations that there could have been a lack of investment in the network. Benyamin Netanyahou (PM of Israel) is currently at the heart of some corruption charges, especially the case &#8220;4,000&#8221; (<a href="https://bbc.in/3nIeyVj" target="_blank" rel="noreferrer noopener">https://bbc.in/3nIeyVj</a>)</p>



<p>Among the accusations, some supposed intervention of the PM in favor of <strong><span class="has-inline-color has-luminous-vivid-orange-color">Bezeq International Ltd</span></strong>, the historical Telecom operator in Israel (<a href="https://bit.ly/2RdXzhE" target="_blank" rel="noreferrer noopener">https://bit.ly/2RdXzhE</a>), which would have entailed a delay in the network improvement as compared with international standards</p>



<p>Looking into the data, it is clear that Israel is not in the pole position, however, <strong><span class="has-inline-color has-luminous-vivid-orange-color">its global ranking in the speed tests is reasonable</span></strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1009" height="927" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-13.png" alt="" class="wp-image-1638" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-13.png 1009w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-13-300x276.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-13-768x706.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>Source : https://www.speedtest.net/global-index/israel</figcaption></figure>



<p>Let&#8217;s come back to the physical cables. In 2018, <strong><span class="has-inline-color has-luminous-vivid-orange-color">some cables were exposed after a strong winter storm</span></strong> : <a href="https://bit.ly/3vAMrtY" target="_blank" rel="noreferrer noopener">https://bit.ly/3vAMrtY</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-6.png" alt="" class="wp-image-1622" width="300" height="185" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-6.png 745w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-6-300x186.png 300w" sizes="(max-width: 300px) 100vw, 300px" /></figure>



<p>During strong storms, the waves’ action is felt deeper. The coasts, especially the sandy ones, suffer the most dramatic changes from the waves’ action. When cables in such areas are not buried deeply enough, the removal of sediment may expose them to the surface</p>



<p>Of course, this is not a desired situation, but this happens sometimes with such cables. This has to be corrected quickly as it could entail further sabotage actions. In such cases, a deeper trench should be considered</p>



<p>Now, let&#8217;s query the IANA Internet Assigned Numbers Authority and find the root zone for Israel : <a href="https://bit.ly/3t4wdru" target="_blank" rel="noreferrer noopener">https://bit.ly/3t4wdru</a> -&gt; country code Top Level Domain or <strong><span class="has-inline-color has-luminous-vivid-orange-color">TLD is .IL</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-2.png" alt="" class="wp-image-1613" width="458" height="383" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-2.png 827w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-2-300x251.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-2-768x642.png 768w" sizes="(max-width: 458px) 100vw, 458px" /></figure>



<p>ISOC stands for Israel Internet Association (<a href="https://en.isoc.org.il/" target="_blank" rel="noreferrer noopener">https://en.isoc.org.il/</a>). It manages the <strong><span class="has-inline-color has-luminous-vivid-orange-color">Israeli Internet Exchange (IIX)</span></strong> which is an Internet exchange point (IXP) that provides peering services for the Internet Service Providers in Israel, essentially routing all intra-Israel internet traffic. A few statistic of domain names in Israel is provided below</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-9.png" alt="" class="wp-image-1625" width="432" height="345" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-9.png 887w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-9-300x240.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-9-768x615.png 768w" sizes="(max-width: 432px) 100vw, 432px" /></figure>



<p>A simple Whois on the <strong><span class="has-inline-color has-luminous-vivid-orange-color">IP 128.139.34.240</span></strong> provides the <strong><span class="has-inline-color has-luminous-vivid-orange-color">AS number 378</span></strong>. AS stands for the Autonomous System Number (AS number&nbsp;or just&nbsp;ASN), and it is a special number assigned by IANA, which uniquely identifies a network under a single technical administration that has a unique routing policy</p>



<p>In the RIPEstat (<a href="https://bit.ly/3nPCmad" target="_blank" rel="noreferrer noopener">https://bit.ly/3nPCmad</a>), we can go further in the path for this ASN</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-3.png" alt="" class="wp-image-1615" width="353" height="306" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-3.png 529w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-3-300x260.png 300w" sizes="(max-width: 353px) 100vw, 353px" /></figure>



<p>AS200309 corresponds to the Kibbutzim College in Tel Aviv. This ASN allows us to root back to AS8551, which corresponds to <strong><span class="has-inline-color has-luminous-vivid-orange-color">Bezeq International Ltd</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-7.png" alt="" class="wp-image-1623" width="486" height="474" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-7.png 834w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-7-300x293.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-7-768x751.png 768w" sizes="(max-width: 486px) 100vw, 486px" /></figure>



<p>A RIPEstat query for AS8551 shows that this ASN has been found in recent blacklists &#8220;level3&#8221; or &#8220;<strong><span class="has-inline-color has-luminous-vivid-orange-color">uceprotect-level3</span></strong>&#8220;. What is this ? The purpose of this &#8220;RBL&#8221; UCEPROTECT blacklist is to block ASNs that allow spam to be sent from a large number of IP addresses in the network</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Realtime Blackhole Lists (RBLs)</span></strong> can be a great tool in your security arsenal. You may not know you’re using them, but all email providers and company email servers leverage these services to verify whether servers and IP addresses are sending spam or other abusive content against a known list of offenders</p>



<p>These services use a number of methods to compile lists of IP addresses reputed to send spam, mostly populating them using honeypots. RBLs serve as a useful database of known abusive IP addresses</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-11.png" alt="" class="wp-image-1634" width="573" height="66" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-11.png 964w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-11-300x35.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-11-768x89.png 768w" sizes="(max-width: 573px) 100vw, 573px" /></figure>



<p>It is important to mention that UCEPROTECT is not considered to be a reliable source by some analysts : <a href="https://bit.ly/3aWYfiu" target="_blank" rel="noreferrer noopener">https://bit.ly/3aWYfiu</a></p>



<p>Anyway, here is an excerpt list of the suspicious IPs found by a query of AS8551 in RIPEstat</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-8.png" alt="" class="wp-image-1624" width="308" height="502" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-8.png 448w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-8-184x300.png 184w" sizes="(max-width: 308px) 100vw, 308px" /><figcaption>Source : https://bit.ly/3eSdhr4</figcaption></figure>



<p>We can see that this IP list matches quite well the AS8551 IPv4 address subnets</p>



<p>At the time of writing this article, Bezeq was ranked in the position n°1580 of the global &#8220;UCEPROTECT Level 3 Charts&#8221;, out of 1875 records. However, it is important to mention that there are more than 10000 ISP worldwide. So, we can reasonably consider that there is a <strong><span class="has-inline-color has-luminous-vivid-orange-color">spam issue on the Bezeq network</span></strong></p>



<p>Is it a big issue ? Not sure. Here are some statistics from Kaspersky : <a href="https://bit.ly/2QRFvKe" target="_blank" rel="noreferrer noopener">https://bit.ly/2QRFvKe</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-12.png" alt="" class="wp-image-1636" width="517" height="512" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-12.png 784w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-12-300x297.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-12-150x150.png 150w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-12-768x760.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-12-100x100.png 100w" sizes="(max-width: 517px) 100vw, 517px" /></figure>



<p>Israel is far from the &#8220;top 10 countries&#8221; for spam reports. However, in relative terms, taking into account the size of Israel, their score report shows quite a strong spam activity &#8220;per person&#8221;. Their was an article from 2014 saying that Israel &#8220;was a Mecca for spammers&#8221; when doing the ratio of spam activity vs inhabitants in the country : <a href="https://bit.ly/3nEhXop" target="_blank" rel="noreferrer noopener">https://bit.ly/3nEhXop</a></p>



<p>Israel is a small country, with fewer computers than the top spam-sending countries. For smaller countries, such as Israel, the benchmark of poor anti-spam security is the number of messages sent out relative to the population. <strong><span class="has-inline-color has-luminous-vivid-orange-color">Israeli computers on average relay some significant spam</span></strong> <strong><span class="has-inline-color has-luminous-vivid-orange-color">activity</span></strong></p>



<p>Does that mean that there are a larger number of infected computers in Israel that are being used by spammers elsewhere ? We can probably say, that there is <strong><span class="has-inline-color has-luminous-vivid-orange-color">room for improvement</span></strong> in the effective use of malware and virus detection systems, especially when you consider that Israel pretends to be a leader in cybersecurity</p>



<p>But to be fair, it is extremely difficult to block spam traffic, as offenders are very creative and use relays to spread. No country, even if very strong in cybersecurity, can really block spam traffic, as it also depends heavily on end users</p>



<p>Additional reading -&gt; there&#8217;s a good <strong><span class="has-inline-color has-luminous-vivid-orange-color">NATO study </span></strong>about Israel : <a href="https://bit.ly/3hPblmd" target="_blank" rel="noreferrer noopener">https://bit.ly/3hPblmd</a></p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Social media and internet manipulation</span></strong></p>



<p>Because of its unique situation (as explained above), Israel is quite logically using the social networks for its security and political targets. Private sector companies with former officials from surveillance agencies, are coming in handy for this ! There are also many attempts to manipulate the opinion against Israel</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-14.png" alt="" class="wp-image-1650" width="396" height="92" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-14.png 706w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-14-300x71.png 300w" sizes="(max-width: 396px) 100vw, 396px" /></figure>



<p>This statement from a former Israeli intelligence officer says it all (<a href="https://bit.ly/3baNHMA" target="_blank" rel="noreferrer noopener">https://bit.ly/3baNHMA</a>)</p>



<p><em><span class="has-inline-color has-vivid-cyan-blue-color">“Social media allows you to reach virtually anyone and to play with their minds. “You can do whatever you want. You can be whoever you want. It’s a place where wars are fought, elections are won, and terror is promoted. There are no regulations. It is a no man’s land.”</span></em></p>



<p>Before continuing, it is very usefull to watch this video about Israeli private intelligence companies, as it will set the overall tone, and introduce major companies such as <strong><span class="has-inline-color has-luminous-vivid-orange-color">PsyGroup</span></strong>, <strong><span class="has-inline-color has-luminous-vivid-orange-color">NSO</span></strong>, <strong><span class="has-inline-color has-luminous-vivid-orange-color">Black Cube</span></strong>,&#8230;</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Israeli Private Intelligence Companies Turn Civilians into Enemies" width="525" height="295" src="https://www.youtube.com/embed/vwPxQhE2xIA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>There has been several manipulation tactics deployed. I provide here below some examples</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">PsyGroup</span></strong></p>



<p>PsyGroup is a former Israeli private intelligence agency. In 2016, they had started a campaign against &#8220;Boycott Divestment Sanctions&#8221; activists on US college campuses, private sector and NGOs supporting the BDS cause</p>



<p>PsyGroup collected informations on these activists, either from social media and from HUMINT sources (intelligence methodologies)</p>



<p>PsyGroup operated a website &#8220;<strong><span class="has-inline-color has-vivid-cyan-blue-color">outlawbds.com</span></strong>&#8221; that is now out of service, which published informations about BDS activists. Some traces of this website can be found in the <strong><span class="has-inline-color has-vivid-cyan-blue-color">wayback machine</span></strong> (<a href="https://bit.ly/3xVW48B" target="_blank" rel="noreferrer noopener">https://bit.ly/3xVW48B</a>)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-15-1024x202.png" alt="" class="wp-image-1655" width="566" height="111" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-15-1024x202.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-15-300x59.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-15-768x152.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-15.png 1229w" sizes="(max-width: 566px) 100vw, 566px" /><figcaption>The &#8220;about&#8221; section of outlawsbds.com</figcaption></figure>



<p>In this site, you could find the photos, names, and links to the social media pages of these activists (Facebook, Twitter, Linkedin,&#8230;)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-16.png" alt="" class="wp-image-1656" width="336" height="365" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-16.png 545w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-16-276x300.png 276w" sizes="(max-width: 336px) 100vw, 336px" /><figcaption>Sample picture in the Public &amp; NPOs section</figcaption></figure>



<p>The activities against the BDS movement had been coordinated with the code name &#8220;Project Butterfly&#8221;, with top participants including former intelligence and government officials. The project has been structured with a complete report issued by PsyGroup, detailing its purpose, timing, budget,&#8230;</p>



<figure class="wp-block-image size-large"><img decoding="async" width="910" height="419" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-17.png" alt="" class="wp-image-1657" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-17.png 910w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-17-300x138.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-17-768x354.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<div class="wp-block-file"><a href="https://www.forensicxs.com/wp-content/uploads/2021/05/Entous-Butterfly.pdf">Project Butterfly</a><a href="https://www.forensicxs.com/wp-content/uploads/2021/05/Entous-Butterfly.pdf" class="wp-block-file__button" download>Download</a></div>



<p>I would like to mention that there has been a lot of controversy around the BDS movement. There are still articles to be found about it in 2021 : <a href="https://yhoo.it/3hkOVJ0" target="_blank" rel="noreferrer noopener">https://yhoo.it/3hkOVJ0</a></p>



<p>Through the project Butterfly, Israel used some ways to identify, expose the activists and defend itself</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Social media bots</span></strong></p>



<p>There have been several reports that Israeli politicians make use of Twitter bots to influence this social network and push it to their advantage : <a href="https://bit.ly/3vSCisN" target="_blank" rel="noreferrer noopener">https://bit.ly/3vSCisN</a></p>



<p>On the other hand, there have been recent reports of Twitter bots agressive towards Israel</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Israeli Ministry Uncovers Anti-Israel Twitter Bots" width="525" height="295" src="https://www.youtube.com/embed/6FFSV0AX-Is?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>One tool to uncover twitter bots / fake accounts, is <strong><span class="has-inline-color has-vivid-cyan-blue-color">TwitterAudit</span></strong> (requires a PRO version to proceed with searches). The accuracy and interest of this tool is documented here : <a href="https://bit.ly/3txHXD8" target="_blank" rel="noreferrer noopener">https://bit.ly/3txHXD8</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-19.png" alt="" class="wp-image-1661" width="375" height="633" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-19.png 519w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-19-178x300.png 178w" sizes="(max-width: 375px) 100vw, 375px" /><figcaption><a href="https://www.twitteraudit.com/" target="_blank" rel="noreferrer noopener">Twitter Audit | How many of your followers are real?</a></figcaption></figure>



<p>Israel, like any other countries, has to fight against fake news propagation. A Twitter bot, for example, can be created with some programming knowledge by any individuals. There are quite a few tutorials to be found on YouTube</p>



<p>There has been an initiative launched to create an App that involves any citizen to alert about fake news and open criticism against Israel : <strong><span class="has-inline-color has-vivid-cyan-blue-color">Act.IL</span></strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="359" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-20-1024x359.png" alt="" class="wp-image-1662" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-20-1024x359.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-20-300x105.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-20-768x269.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-20.png 1329w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>&#8220;Act-IL is a platform that leverages the power of communities to support Israel through organized online activity. It is the place where all pro-Israeli advocates, communities and organizations meet to work together to fight back against the demonization and delegitimization of the Jewish state&#8221; </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-21.png" alt="" class="wp-image-1663" width="269" height="449" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-21.png 462w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-21-180x300.png 180w" sizes="(max-width: 269px) 100vw, 269px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Netanyahu social media empire</span></strong></p>



<p>The Israeli PM is well know to have a strong social network basis : <a href="https://bit.ly/2R5BfXQ" target="_blank" rel="noreferrer noopener">https://bit.ly/2R5BfXQ</a>. Much like any high ranking politician, he spends money with his party &#8220;Likud&#8221; to manage his social network activities :</p>



<ul class="wp-block-list"><li>Appointment of dedicated resources to manage his accounts</li><li>Cash expenditures to promote his posts</li><li>Use of consultants to help gain visibility, influence, reputation</li></ul>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-22.png" alt="" class="wp-image-1664" width="486" height="715" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-22.png 600w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-22-204x300.png 204w" sizes="(max-width: 486px) 100vw, 486px" /></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Github Projects</span></strong></p>



<p>In this paragraph I&#8217;m going to review some of the codes to be found in Github, searching with the key words &#8220;Israel&#8221; and then &#8220;Palestine&#8221;. There are a few interesting resources that provide additional context about the hobbies, the interests of the coding community out there</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">One Kilometer | Fighting for democracy in Israel</span></strong> : <a href="https://github.com/guytepper/1km.co.il" target="_blank" rel="noreferrer noopener">https://github.com/guytepper/1km.co.il</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="540" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-29-1024x540.png" alt="" class="wp-image-1714" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-29-1024x540.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-29-300x158.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-29-768x405.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-29.png 1432w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Israel’s second lockdown due to COVID19 had shaken the country with a political crisis, the government restricting the right to protest to a distance of one kilometer from ones homes. Because of this, some members of the anti-Netanyahu protest movement have launched an App dedicated to manage protests in the one kilometer radius</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="120" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-23-1024x120.png" alt="" class="wp-image-1668" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-23-1024x120.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-23-300x35.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-23-768x90.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-23.png 1259w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>After providing your address, the site will refer you to a list of protests happening in your vicinity and will even provide a link to the WhatsApp group of that specific demonstrations’ organizers</p>



<p>The code is written in <strong><span class="has-inline-color has-vivid-cyan-blue-color">React</span></strong> &#8211; based upon Javascript &#8211; for the Front End, and <strong><span class="has-inline-color has-vivid-cyan-blue-color">Firebase</span></strong> is used for the Back End. It loads some important libraries</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-30.png" alt="" class="wp-image-1715" width="180" height="44"/></figure>



<p>GeoFirestore&nbsp;selectively loads the data near certain locations, keeping the application light and responsive, even with large datasets. GeoLib is a computational geometry library. Both will be usefull in the context of this app, for location based storage and calculation of radius/distance</p>



<p>The user location is catched</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-31.png" alt="" class="wp-image-1716" width="367" height="149" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-31.png 623w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-31-300x122.png 300w" sizes="(max-width: 367px) 100vw, 367px" /><figcaption>src/components/Map/AdressBar.js</figcaption></figure>



<p>Protests are created</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-32.png" alt="" class="wp-image-1717" width="476" height="239" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-32.png 796w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-32-300x151.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-32-768x387.png 768w" sizes="(max-width: 476px) 100vw, 476px" /><figcaption>src/api/index.js</figcaption></figure>



<p>Then protests are sorted to match the user location</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-33.png" alt="" class="wp-image-1718" width="354" height="441" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-33.png 606w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-33-241x300.png 241w" sizes="(max-width: 354px) 100vw, 354px" /><figcaption>src/utils.js</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Isracoin | The Israeli Cryptocurrency</span></strong> : <a href="https://github.com/israelcoin/Isracoin" target="_blank" rel="noreferrer noopener">https://github.com/israelcoin/Isracoin</a></p>



<p>Isracoin is a defunct cryptocurrency &#8220;made in Israel&#8221;. It was launched in 2014 but was quickly phased out, at a time when Bitcoin was still in its infancy. Here is a background statement issued when Isracoin was launched</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-35.png" alt="" class="wp-image-1722" width="483" height="443" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-35.png 820w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-35-300x276.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-35-768x706.png 768w" sizes="(max-width: 483px) 100vw, 483px" /><figcaption><a href="https://bit.ly/3fhCj31" target="_blank" rel="noreferrer noopener">https://bit.ly/3fhCj31</a></figcaption></figure>



<p>Isracoin was based on the Blockchain technology. This launch did not work as expected. However, Israel plays nowadays a leading role in cryptocurrencies. There are several crypto stock exchanges : <a href="https://bit.ly/3fhsCSa" target="_blank" rel="noreferrer noopener">https://bit.ly/3fhsCSa</a></p>



<p>Currently, the Bank of Israel is taking gradual steps in preparing for the launch of its own central bank digital currency (CBDC) : <a href="https://bit.ly/33ICLSj" target="_blank" rel="noreferrer noopener">https://bit.ly/33ICLSj</a></p>



<p>The currency in question for Israel would be the digital shekel.&nbsp; But, there are no firm steps laid out at this moment in time</p>



<p>The Github page includes a basic Python script <strong><span class="has-inline-color has-vivid-cyan-blue-color">pyminer.py</span></strong>, simulating a miner. The code  shows quite clearly the way that hashing is performed in order to mine new blocks</p>



<figure class="wp-block-image size-large"><img decoding="async" width="575" height="942" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-39.png" alt="" class="wp-image-1727" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-39.png 575w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-39-183x300.png 183w" sizes="(max-width: 575px) 100vw, 575px" /></figure>



<p>It is however a CPU-only algorithm, and doesn&#8217;t use some of the more advanced mechanisms for accelerating the hashing process. And therefore, it will be slow to run</p>



<p>Despite this, it definitely offers a good introduction into how the generation of blocks and hashing works, without the added complexity of having to deal with GPU-based mining code, which is highly optimised and as a result will likely be more difficult to understand</p>



<p>The Isracoin App itself has been written in <strong><span class="has-inline-color has-vivid-cyan-blue-color">C++</span></strong>, obviously to ensure a good performance. It also includes the <strong><span class="has-inline-color has-vivid-cyan-blue-color">Qt GUI</span></strong> framework to build the application</p>



<p>Some usual security countermeasures inherent to C code were taken into account (protection against buffer overflow and other stack attacks,&#8230;)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-36-1024x331.png" alt="" class="wp-image-1723" width="579" height="186" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-36-1024x331.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-36-300x97.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-36-768x248.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-36.png 1053w" sizes="(max-width: 579px) 100vw, 579px" /><figcaption>isracoin-qt.pro</figcaption></figure>



<p>Then, the C++ code is very complex and would need a full and long article to explain it in detail, as this App is a fully fledged application, including a complete GUI, mining, wallet management and more. I will just show some comments included in the mining file, to give a preview of what parameters it considers for the mining process</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-40-1024x418.png" alt="" class="wp-image-1728" width="642" height="262" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-40-1024x418.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-40-300x123.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-40-768x314.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-40.png 1075w" sizes="(max-width: 642px) 100vw, 642px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">RedAlert | Real-time rocket alerts</span></strong> : <a href="https://github.com/eladnava/redalert-android" target="_blank" rel="noreferrer noopener">https://github.com/eladnava/redalert-android</a></p>



<p>This app has been created following the 2014 clash between Israeli and Palestinians, and the <strong><span class="has-inline-color has-vivid-cyan-blue-color">rocket attacks</span></strong> against Israel’s south by Gaza Hamas : <a href="https://bit.ly/3tO5S1g" target="_blank" rel="noreferrer noopener">https://bit.ly/3tO5S1g</a></p>



<p>It somehow reduces the risk that those in the affected areas would not hear the instituted “Red Color” emergency sirens, that are supposed to warn residents 15 seconds in advance of a rocket explosion</p>



<p>As a “backup” warning system, Red Alert has been developed. It sounds a warning on cellphones at the same time the real siren goes off</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-25.png" alt="" class="wp-image-1670" width="391" height="355" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-25.png 726w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-25-300x273.png 300w" sizes="(max-width: 391px) 100vw, 391px" /><figcaption><a href="https://redalert.me/" target="_blank" rel="noreferrer noopener">https://redalert.me/</a></figcaption></figure>



<p>The app utilizes real-time alert data provided by the Home Front Command (Pikud Haoref). Rocket alerts are detected using the open-source <strong><span class="has-inline-color has-vivid-cyan-blue-color">pikud-haoref-api Node.js</span></strong> package</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-41.png" alt="" class="wp-image-1729" width="491" height="522" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-41.png 825w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-41-282x300.png 282w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-41-768x817.png 768w" sizes="(max-width: 491px) 100vw, 491px" /></figure>



<p>The App is written in <strong><span class="has-inline-color has-vivid-cyan-blue-color">Java</span></strong>. The user can select its location and city</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-42.png" alt="" class="wp-image-1730" width="463" height="239" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-42.png 706w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-42-300x155.png 300w" sizes="(max-width: 463px) 100vw, 463px" /><figcaption>AlertPopup.java</figcaption></figure>



<p>As shows the strings.xml file, here are some of the functions provided by this App</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-44-1024x599.png" alt="" class="wp-image-1732" width="685" height="401" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-44-1024x599.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-44-300x175.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-44-768x449.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-44.png 1033w" sizes="(max-width: 685px) 100vw, 685px" /></figure>



<p>The App will generate notifications when Rockets are launched around the user location</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-45.png" alt="" class="wp-image-1735" width="432" height="151" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-45.png 635w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-45-300x105.png 300w" sizes="(max-width: 432px) 100vw, 432px" /><figcaption>RocketNotifications.java</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Open Pension | &#8220;Hasadna&#8221; project</span></strong> aimed to revealing the secrets behind the Israeli pension market : <a href="https://github.com/hasadna/open_pension" target="_blank" rel="noreferrer noopener">https://github.com/hasadna/open_pension</a></p>



<p>This is one project of the &#8220;Public Knowledge Workshop&#8221;. Here below their purpose</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="255" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-47-1024x255.png" alt="" class="wp-image-1740" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-47-1024x255.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-47-300x75.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-47-768x191.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-47.png 1232w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption><a href="https://www.hasadna.org.il/en/" target="_blank" rel="noreferrer noopener">https://www.hasadna.org.il/en/</a></figcaption></figure>



<p>This is, in my opinion, a great initiative, showing the commitment of Israeli citizens and the wish for transparency in public services</p>



<p>We have seen the fast COVID19 vaccination campaign in Israel, in exchange of a large medical data access to Pfizer : <a href="https://n.pr/34ezLNG" target="_blank" rel="noreferrer noopener">https://n.pr/34ezLNG</a> [note : Israel has applied cyberwar <strong><span class="has-inline-color has-vivid-cyan-blue-color">crisis management</span></strong> to the COVID19 issue]</p>



<p>Although there has been voices against it, this confirms that Israel is relatively opened in terms of data publication</p>



<p>Hasadna organizes some Hackhaton to accelerate the innovation around these projets </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-26-1024x423.png" alt="" class="wp-image-1671" width="571" height="235" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-26-1024x423.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-26-300x124.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-26-768x317.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-26.png 1303w" sizes="(max-width: 571px) 100vw, 571px" /></figure>



<p>They run several disclosure projects : <a href="https://www.hasadna.org.il/en/projects/" target="_blank" rel="noreferrer noopener">https://www.hasadna.org.il/en/projects/</a></p>



<p>I have chosen the OpenPension project, aimed at providing an insight into the investment policy of pension funds in Israel, including their risk management and asset allocation. Part of the tool is based upon <strong><span class="has-inline-color has-vivid-cyan-blue-color">Microsoft</span></strong> <strong><span class="has-inline-color has-vivid-cyan-blue-color">PowerBI</span></strong> for data visualization</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-48.png" alt="" class="wp-image-1742" width="466" height="491" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-48.png 713w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-48-284x300.png 284w" sizes="(max-width: 466px) 100vw, 466px" /><figcaption><a href="http://www.openpension.org.il/" target="_blank" rel="noreferrer noopener">http://www.openpension.org.il/</a></figcaption></figure>



<p>The code available in the Github page, based upon <strong><span class="has-inline-color has-vivid-cyan-blue-color">Go</span></strong> and <strong><span class="has-inline-color has-vivid-cyan-blue-color">GraphQL</span></strong>, is gathering data as in the exemple given below</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-51-1024x513.png" alt="" class="wp-image-1746" width="618" height="309" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-51-1024x513.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-51-300x150.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-51-768x385.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-51.png 1145w" sizes="(max-width: 618px) 100vw, 618px" /><figcaption>application/test/dummy_json.json</figcaption></figure>



<p>The corresponding data is placed into multiple structures as follows (exemple with financial instruments)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-53.png" alt="" class="wp-image-1750" width="481" height="354" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-53.png 739w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-53-300x221.png 300w" sizes="(max-width: 481px) 100vw, 481px" /><figcaption>application/Models/instrument.go</figcaption></figure>



<p>To achieve this, the App is based upon multiple queries in the database, looking for the expected attributes</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-50.png" alt="" class="wp-image-1745" width="467" height="258" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-50.png 769w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-50-300x166.png 300w" sizes="(max-width: 467px) 100vw, 467px" /><figcaption>application/graphql/query.go</figcaption></figure>



<p>The connection to the SQL database is managed with this module</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-52-1024x630.png" alt="" class="wp-image-1747" width="724" height="445" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-52-1024x630.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-52-300x185.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-52-768x473.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-52.png 1193w" sizes="(max-width: 724px) 100vw, 724px" /><figcaption>application/api/db.go</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Israel Palestine Petition</span></strong> : <a href="https://github.com/100millionvoices/israel-palestine-petition" target="_blank" rel="noreferrer noopener">https://github.com/100millionvoices/israel-palestine-petition</a></p>



<p>This is a petition platform, this one being specialized on the Israel | Palestine issue. The code is strongly borrowed from <a href="https://github.com/alphagov/e-petitions" target="_blank" rel="noreferrer noopener">https://github.com/alphagov/e-petitions</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-54.png" alt="" class="wp-image-1753" width="288" height="240" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-54.png 644w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-54-300x250.png 300w" sizes="(max-width: 288px) 100vw, 288px" /><figcaption><a href="https://petition.parliament.uk/" target="_blank" rel="noreferrer noopener">https://petition.parliament.uk/</a></figcaption></figure>



<p>The code is written in <strong><span class="has-inline-color has-vivid-cyan-blue-color">Ruby</span></strong>. Here below, the data which is collected each time the petition is signed </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-55-1024x353.png" alt="" class="wp-image-1754" width="642" height="221" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-55-1024x353.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-55-300x103.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-55-768x265.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-55.png 1038w" sizes="(max-width: 642px) 100vw, 642px" /></figure>



<p>The signature process includes a captcha validation</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-56.png" alt="" class="wp-image-1755" width="535" height="493" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-56.png 901w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-56-300x277.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-56-768x708.png 768w" sizes="(max-width: 535px) 100vw, 535px" /><figcaption>app/controllers/signatures_controller.rb</figcaption></figure>



<p>It has also the <strong><span class="has-inline-color has-vivid-cyan-blue-color">I18n</span></strong> code : <a href="https://en.wikipedia.org/wiki/Internationalization_and_localization" target="_blank" rel="noreferrer noopener">https://en.wikipedia.org/wiki/Internationalization_and_localization</a></p>



<p>So, your web page is going to be adapted to your local settings as per your Geographical location</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-57.png" alt="" class="wp-image-1756" width="580" height="534" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-57.png 903w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-57-300x276.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-57-768x708.png 768w" sizes="(max-width: 580px) 100vw, 580px" /><figcaption><em>app/controllers/signatures_controller.rb</em></figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Politibot | Create tweets like Israeli politicians</span></strong> : <a href="https://github.com/GilZ/politibot" target="_blank" rel="noreferrer noopener">https://github.com/GilZ/politibot</a></p>



<p>Politibot takes recent politicians tweets, creates a <strong><span class="has-inline-color has-vivid-cyan-blue-color">Markov chain</span></strong> from them, and then tries to create a tweet that sounds like something they would tweet</p>



<p>A Markov chain is a model describing a sequence of possible events in which the probability of each event depends only on the state attained in the previous event. Nowadays, it is in use in Speech recognition, for example</p>



<p>The App is written in <strong><span class="has-inline-color has-vivid-cyan-blue-color">Python</span></strong>. Here below a preview</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-27.png" alt="" class="wp-image-1673" width="386" height="516" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-27.png 599w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-27-225x300.png 225w" sizes="(max-width: 386px) 100vw, 386px" /></figure>



<p>It includes the dependency <strong><span class="has-inline-color has-vivid-cyan-blue-color">markovify</span></strong>. It is a Markov chain generator. Its primary use is for building Markov models of large texts and generating random sentences from it</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-58.png" alt="" class="wp-image-1758" width="144" height="34"/><figcaption><a href="https://pypi.org/project/markovify/" target="_blank" rel="noreferrer noopener">markovify · PyPI</a></figcaption></figure>



<p>The App is going to follow tweets from the following politicians</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-59.png" alt="" class="wp-image-1759" width="226" height="307" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-59.png 318w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-59-221x300.png 221w" sizes="(max-width: 226px) 100vw, 226px" /><figcaption>config/twitter_users.json</figcaption></figure>



<p>The tweets from these politicians are extracted using the following code</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-61.png" alt="" class="wp-image-1761" width="553" height="564" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-61.png 844w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-61-294x300.png 294w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-61-768x783.png 768w" sizes="(max-width: 553px) 100vw, 553px" /><figcaption>src/politibot/twitter_handler.py</figcaption></figure>



<p>The tweet maker is quite basic and relies entirely on the markovify dependency</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-60.png" alt="" class="wp-image-1760" width="379" height="268" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-60.png 563w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-60-300x212.png 300w" sizes="(max-width: 379px) 100vw, 379px" /><figcaption>src/politibot/tweet_maker.py</figcaption></figure>



<p>The tweets will be generated finally with this loop</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-62.png" alt="" class="wp-image-1762" width="546" height="194" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-62.png 811w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-62-300x107.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-62-768x273.png 768w" sizes="(max-width: 546px) 100vw, 546px" /><figcaption>src/politibot/main.py</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Ransomware free Palestine</span></strong> : <a href="https://github.com/aymankhalfatni/Palestine_Ransomware" target="_blank" rel="noreferrer noopener">https://github.com/aymankhalfatni/Palestine_Ransomware</a></p>



<p>The ransomware, once your computer has been locked, is asking you to send 10 pictures of you with the message &#8220;Long live Palestine free&#8221;, to the account anonymouxxxxx@gmail.com. Then, you are supposed to receive an unlock key shortly after</p>



<p>A facebook link is referenced on the screen : fb.com/khelfatni (but this account is inactive)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-63.png" alt="" class="wp-image-1764" width="565" height="538" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-63.png 870w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-63-300x286.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-63-768x732.png 768w" sizes="(max-width: 565px) 100vw, 565px" /></figure>



<p>Hash SHA256 in the text file &#8220;hashVIRUS.txt&#8221; :</p>



<p><strong><span class="has-inline-color has-vivid-red-color">c89944f9ec704c2b8da3a1acf726699022e7c68334110f72007d762217a9a4a5</span></strong></p>



<p>Hash SHA256 of the file ransomware.exe (unpacked) :</p>



<p><strong><span class="has-inline-color has-vivid-red-color">0261b2122b402e5ac232c86577bba26818e7a5687881c35c566c5f00c19afe52</span></strong></p>



<p>Let&#8217;s have a look at the two attached files available in the Github repository</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">ransomware.html</span></strong></p>



<p>This file includes the necessary code (<strong><span class="has-inline-color has-vivid-red-color">HTML</span></strong> and <strong><span class="has-inline-color has-vivid-red-color">Javascript</span></strong>) to display the above locked page. It also includes a countdown mechanism</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-64.png" alt="" class="wp-image-1766" width="515" height="423" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-64.png 826w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-64-300x247.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-64-768x632.png 768w" sizes="(max-width: 515px) 100vw, 515px" /><figcaption>ransomware.html</figcaption></figure>



<p>You can run this html file in your browser, and you will see that the code is working as the countdown is actually ticking</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">ransomware.exe</span></strong></p>



<p>Let&#8217;s download this file in a Virtual Machine, just to make sure it does not harm our computer. As a first check, I run <strong><span class="has-inline-color has-vivid-red-color">PEiD</span></strong> to check if the file is packed. Yes, it is ! It&#8217;s packed using ASPack</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-65.png" alt="" class="wp-image-1768" width="357" height="201" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-65.png 413w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-65-300x169.png 300w" sizes="(max-width: 357px) 100vw, 357px" /></figure>



<p>A search in Google and we find a tool to unpack it : <a href="https://www.aldeid.com/wiki/AspackDie" target="_blank" rel="noreferrer noopener">https://www.aldeid.com/wiki/AspackDie</a></p>



<p>When clicking on the ransomware.exe, another windows file box is opening. We are invited to find a .wex file and open it</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-67.png" alt="" class="wp-image-1771" width="285" height="181" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-67.png 420w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-67-300x191.png 300w" sizes="(max-width: 285px) 100vw, 285px" /></figure>



<p>A .wex file is a WexView Browser Data file. <strong><span class="has-inline-color has-vivid-red-color">WexView</span></strong> is a self-contained browser (<strong><span class="has-inline-color has-vivid-red-color">WebExe</span></strong>)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-68.png" alt="" class="wp-image-1772" width="561" height="245" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-68.png 826w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-68-300x131.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-68-768x336.png 768w" sizes="(max-width: 561px) 100vw, 561px" /></figure>



<p>Other way round, we can transform the html file into an exe and execute it outside of a browser</p>



<p>We can assume that the ransomware.exe was built using the ransomware.html and the WebExe software. So, this .exe can be distributed by any means and will launch in a browser environment whatever your PC configuration</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">technical analysis</span></strong></p>



<p><em>From the hash given in the text file &#8220;hashVIRUS.txt&#8221;</em>, we can find several resources on the web :</p>



<p><strong><span class="has-inline-color has-vivid-red-color">indicators</span></strong> : <a href="https://bit.ly/3yhAOdC" target="_blank" rel="noreferrer noopener">https://bit.ly/3yhAOdC</a></p>



<p><strong><span class="has-inline-color has-vivid-red-color">behavior</span></strong> : <a href="https://bit.ly/33Ou74M" target="_blank" rel="noreferrer noopener">https://bit.ly/33Ou74M</a></p>



<p><strong><span class="has-inline-color has-vivid-red-color">what it does</span></strong> : <a href="https://bit.ly/2RZmbew" target="_blank" rel="noreferrer noopener">https://bit.ly/2RZmbew</a></p>



<p>It&#8217;s a screen locker and not a real ransomware !</p>



<p><em>From the hash of the file ransomware.exe (unpacked)</em>, here is what we find :</p>



<p><strong><span class="has-inline-color has-vivid-red-color">indicators</span></strong> : <a href="https://bit.ly/3uSPDkU" target="_blank" rel="noreferrer noopener">https://bit.ly/3uSPDkU</a></p>



<p><strong><span class="has-inline-color has-vivid-red-color">behavior</span></strong> : <a href="https://bit.ly/3hrmJV6" target="_blank" rel="noreferrer noopener">https://bit.ly/3hrmJV6</a></p>



<p>There is no call to the HTML file. On VirusTotal, Microsoft classifies it as the malware Program:Win32/Wacapew.C!ml. There&#8217;s a post on Reddit which provides some background</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-69.png" alt="" class="wp-image-1775" width="584" height="146" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-69.png 709w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-69-300x75.png 300w" sizes="(max-width: 584px) 100vw, 584px" /><figcaption><a href="https://bit.ly/3uU1kHR" target="_blank" rel="noreferrer noopener">https://bit.ly/3uU1kHR</a></figcaption></figure>



<p>Overall, the files available look like an unfinished product, a simulation of a locker program but the components provided are not integrated together</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Dynamic-ransom | Ransomware Detection</span></strong> : <a href="https://github.com/skaspi/dynamic-ransom" target="_blank" rel="noreferrer noopener">https://github.com/skaspi/dynamic-ransom</a></p>



<p>This is a <strong><span class="has-inline-color has-vivid-cyan-blue-color">Python</span></strong> script. It is based on the fact that during encryption by a ransomware, files extensions are modified. The script will check if the files in your system are modified and considers that this is a ransomware if at least 40 files extensions have been modified</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-70.png" alt="" class="wp-image-1777" width="341" height="161" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-70.png 477w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-70-300x142.png 300w" sizes="(max-width: 341px) 100vw, 341px" /><figcaption>script.py</figcaption></figure>



<p>A &#8220;watchdog&#8221; screens and monitors changes made to the directory location it is pointing to</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-72.png" alt="" class="wp-image-1779" width="455" height="269" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-72.png 677w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-72-300x177.png 300w" sizes="(max-width: 455px) 100vw, 455px" /></figure>



<p>The program will issue the corresponding warnings</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-71.png" alt="" class="wp-image-1778" width="257" height="204" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-71.png 376w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-71-300x239.png 300w" sizes="(max-width: 257px) 100vw, 257px" /><figcaption>catastrophe.py</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Israeli ID validator</span></strong> : <a href="https://github.com/atlanteh/israeli-id-validator" target="_blank" rel="noreferrer noopener">https://github.com/atlanteh/israeli-id-validator</a></p>



<p>This is a basic ID validator written in <strong><span class="has-inline-color has-vivid-cyan-blue-color">Javascript</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-73.png" alt="" class="wp-image-1780" width="328" height="263" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-73.png 525w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-73-300x241.png 300w" sizes="(max-width: 328px) 100vw, 328px" /><figcaption>index.js</figcaption></figure>



<p>Why is this interesting here ? The ID is the basic identification number for a given citizen and is widely in use : <a href="https://bit.ly/2Qm7y4m" target="_blank" rel="noreferrer noopener">https://bit.ly/2Qm7y4m</a></p>



<figure class="wp-block-image size-large"><img decoding="async" width="347" height="570" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-74.png" alt="" class="wp-image-1781" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-74.png 347w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-74-183x300.png 183w" sizes="(max-width: 347px) 100vw, 347px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Data of deaths in Israeli-Palestinian conflict</span></strong> : <a href="https://github.com/aiza-k/Israel-Palestine" target="_blank" rel="noreferrer noopener">https://github.com/aiza-k/Israel-Palestine</a></p>



<p>This one provides data about : deaths in Israeli-Palestinian conflict, and US military aid to Israel. The App is coded in <strong><span class="has-inline-color has-vivid-cyan-blue-color">R language</span></strong> (statistical analysis) to calculate the graphs from the datasources. You then have the possibility to launch the analysis with the provided html file, or directly opening the corresponding PDF reports</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-75.png" alt="" class="wp-image-1783" width="465" height="307" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-75.png 736w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-75-300x199.png 300w" sizes="(max-width: 465px) 100vw, 465px" /><figcaption>deaths.R</figcaption></figure>



<p>Some interesting facts about the US Military aid to Israel :</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="183" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-76-1024x183.png" alt="" class="wp-image-1784" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-76-1024x183.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-76-300x54.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-76-768x137.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-76.png 1179w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The <strong><span class="has-inline-color has-vivid-cyan-blue-color">average yearly US Military aid to Israel has been 2.6 billion USD</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-77-1024x539.png" alt="" class="wp-image-1785" width="520" height="273" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-77-1024x539.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-77-300x158.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-77-768x405.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-77.png 1122w" sizes="(max-width: 520px) 100vw, 520px" /><figcaption>US Military aid to Israel</figcaption></figure>



<p>About the death rate, there has been much <strong><span class="has-inline-color has-vivid-cyan-blue-color">more casualties on the Hamas &amp; Palestine side</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-78-1024x613.png" alt="" class="wp-image-1786" width="401" height="240" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-78-1024x613.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-78-300x180.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-78-768x460.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-78.png 1115w" sizes="(max-width: 401px) 100vw, 401px" /></figure>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-79-1024x606.png" alt="" class="wp-image-1787" width="402" height="237" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-79-1024x606.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-79-300x177.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-79-768x454.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-79.png 1104w" sizes="(max-width: 402px) 100vw, 402px" /></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">NSO Group</span></strong></p>



<p>As we said earlier in this article, Israel has a strong cyber ecosystem with some companies dedicated to surveillance activities. Frequently, their technical staff is coming from military &amp; security agencies, such as <strong><span class="has-inline-color has-vivid-cyan-blue-color">Mossad</span></strong> or <strong><span class="has-inline-color has-vivid-cyan-blue-color">Unit 8200</span></strong></p>



<p>NSO Group is one of these companies</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-81.png" alt="" class="wp-image-1793" width="281" height="309" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-81.png 715w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-81-273x300.png 273w" sizes="(max-width: 281px) 100vw, 281px" /><figcaption><a href="https://www.nsogroup.com/" target="_blank" rel="noreferrer noopener">https://www.nsogroup.com/</a></figcaption></figure>



<p>Among other products and services, NSO has developed <strong><span class="has-inline-color has-vivid-cyan-blue-color">Pegasus</span></strong> : a spyware that can be installed on devices running some versions of iOS, Apple&#8217;s mobile operating system, as well on devices running Android</p>



<p>Discovered in August 2016 after a failed attempt at installing it on an iPhone belonging to a human rights activist, an investigation revealed details about the spyware, its abilities, and the security vulnerabilities it exploited</p>



<p>Pegasus is capable of reading text messages, tracking calls, collecting passwords, mobile phone tracking, accessing the target device&#8217;s microphone and video camera, and gathering information from apps</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-83.png" alt="" class="wp-image-1809" width="295" height="197" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-83.png 676w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-83-300x201.png 300w" sizes="(max-width: 295px) 100vw, 295px" /></figure>



<p>Citizen Lab tracked the suspected infections, scanning servers associated to Pergasus and conducting a global <strong><span class="has-inline-color has-vivid-cyan-blue-color">DNS cache probing</span></strong> study : <a href="https://bit.ly/3wu2om6" target="_blank" rel="noreferrer noopener">https://bit.ly/3wu2om6</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-82.png" alt="" class="wp-image-1808" width="631" height="397" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-82.png 1006w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-82-300x189.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-82-768x483.png 768w" sizes="(max-width: 631px) 100vw, 631px" /></figure>



<p>NSO has been critized for facilitating human rights abuses, for example in the following countries :</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">India</span></strong><br>In late 2019, Facebook initiated a suit against NSO, claiming that WhatsApp had been used to hack a number of activists, journalists, and bureaucrats in India, leading to accusations that the Indian government was involved : <a href="https://bit.ly/3hI9z6g" target="_blank" rel="noreferrer noopener">https://bit.ly/3hI9z6g</a></p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Mexico</span></strong><br>Pegasus has been used to target and intimidate Mexican journalists by drug cartels and cartel-entwined government actors : <a href="https://bit.ly/3vdsREm" target="_blank" rel="noreferrer noopener">https://bit.ly/3vdsREm</a></p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Saudi Arabia</span></strong></p>



<p>Pegasus software helped Saudi Arabia to spy on Saudi dissident&#8217;s smartphone and track his communication with journalist Jamal Kashoggi</p>



<p>He was assassinated in 2018 : <a href="https://bit.ly/3fAYKQR" target="_blank" rel="noreferrer noopener">https://bit.ly/3fAYKQR</a></p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Facebook</span></strong>, <strong><span class="has-inline-color has-vivid-cyan-blue-color">Google</span></strong>, <strong><span class="has-inline-color has-vivid-cyan-blue-color">Microsoft</span></strong> and other Tech Giants, have started a lawsuit against NSO, to reduce the risk of proliferation of hacking technology : <a href="https://bit.ly/3fIlu1r" target="_blank" rel="noreferrer noopener">https://bit.ly/3fIlu1r</a></p>



<p>Currently, NSO is said to be in talks with Jordan : <a href="https://bit.ly/3fEddeH" target="_blank" rel="noreferrer noopener">https://bit.ly/3fEddeH</a></p>



<p>Pegasus has been used both on iOS and Android. Here are two reports from Lookout providing a great deal of details about the spyware inner working. Since iOS and Android have been patched in the meantime, those reports only apply to older versions of these OS</p>



<div class="wp-block-file"><a href="https://www.forensicxs.com/wp-content/uploads/2021/05/lookout-pegasus-technical-analysis-1.pdf"><strong><span class="has-inline-color has-vivid-cyan-blue-color">Pegasus for iOS</span></strong></a><a href="https://www.forensicxs.com/wp-content/uploads/2021/05/lookout-pegasus-technical-analysis-1.pdf" class="wp-block-file__button" download>Download</a></div>



<p>The spyware relies on some zero-day vulnerabilities</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-85.png" alt="" class="wp-image-1816" width="528" height="130" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-85.png 784w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-85-300x74.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-85-768x190.png 768w" sizes="(max-width: 528px) 100vw, 528px" /></figure>



<p>It starts with a phishing message. As soon as the user clicks on the provided link, the spyware will install</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-86.png" alt="" class="wp-image-1817" width="539" height="197" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-86.png 919w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-86-300x110.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-86-768x282.png 768w" sizes="(max-width: 539px) 100vw, 539px" /></figure>



<p>Pegasus is going to grab many user data. For example, here is the code for catching user passwords</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-87.png" alt="" class="wp-image-1818" width="459" height="574" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-87.png 599w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-87-240x300.png 240w" sizes="(max-width: 459px) 100vw, 459px" /></figure>



<p>And here is the code for catching WhatsApp messages on the device</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-88.png" alt="" class="wp-image-1819" width="442" height="317" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-88.png 832w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-88-300x215.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-88-768x551.png 768w" sizes="(max-width: 442px) 100vw, 442px" /></figure>



<div class="wp-block-file"><a href="https://www.forensicxs.com/wp-content/uploads/2021/05/lookout-pegasus-android-technical-analysis.pdf"><strong><span class="has-inline-color has-vivid-cyan-blue-color">Pegasus for Android</span></strong></a><a href="https://www.forensicxs.com/wp-content/uploads/2021/05/lookout-pegasus-android-technical-analysis.pdf" class="wp-block-file__button" download>Download</a></div>



<p>The spyware, in the form of an apk, has been distributed to the user via phishing attacks. The apk uses some vulnerabilities in previous Android versions, allowing the attacker to gain root access. A module called Framaroot has been used : <a href="http://framaroot.net/" target="_blank" rel="noreferrer noopener"><strong><span class="has-inline-color has-vivid-cyan-blue-color">http://framaroot.net/</span></strong></a></p>



<p>To complete the installation, Pegasus will look the browsing history and activate only if it finds the necessary configuration strings</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-89.png" alt="" class="wp-image-1821" width="508" height="96" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-89.png 779w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-89-300x57.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-89-768x145.png 768w" sizes="(max-width: 508px) 100vw, 508px" /></figure>



<p>Pegasus will then establish a connection with the Command and Control server</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-90.png" alt="" class="wp-image-1822" width="511" height="44" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-90.png 777w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-90-300x27.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-90-768x68.png 768w" sizes="(max-width: 511px) 100vw, 511px" /></figure>



<p>The communications with the C&amp;C server are encrypted</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-91.png" alt="" class="wp-image-1824" width="505" height="320" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-91.png 778w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-91-300x190.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-91-768x488.png 768w" sizes="(max-width: 505px) 100vw, 505px" /></figure>



<p>The data will be exfiltrated in XML formats. Here an example with calendar events</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-92.png" alt="" class="wp-image-1825" width="445" height="251" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-92.png 781w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-92-300x170.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-92-768x435.png 768w" sizes="(max-width: 445px) 100vw, 445px" /></figure>



<p>Pegasus will maintain persistence, as on iOS, and extract/forward all relevant data in the phone to the C&amp;C server</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">X.509 Certificate</span></strong></p>



<p id="8f75">The root CA certificate installed by the Pegasus spyware was intended to be used to encrypt communications to its C&amp;C server</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-84.png" alt="" class="wp-image-1812" width="321" height="210" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-84.png 516w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-84-300x197.png 300w" sizes="(max-width: 321px) 100vw, 321px" /></figure>



<p id="e995">Using a self-signed root CA certificate with this custom, expensive, nation-state-only espionage software makes sense, as buying a certificate from a regular public CA establishes a payment and customer trail</p>



<p>Here is an analysis of this certificate : <a href="https://bit.ly/3oCxPYY" target="_blank" rel="noreferrer noopener">https://bit.ly/3oCxPYY</a></p>



<p>Overall, Pegasus is really a complexe piece of spyware. It has been designed professionally and is of an advanced quality level</p>



<p>NSO has also been able to take advantage of the <strong><span class="has-inline-color has-vivid-cyan-blue-color">zero-day</span></strong> ecosystem existing in Israel, essential to exploiting flaws in the mobile phones and attacking them</p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Zero day business</span></strong></p>



<p>There are several actors in Israel :</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">NSO Group</span></strong>, which we already presented in the previous chapter. NSO is always looking for zero-day, either by their own research or buying external ones</p>



<p>They target mostly mobile phones hardware</p>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Incredity</span></strong>, an Israel-German platform, dedicated to the disclosure and monetization of zero-day : <a href="https://incredity.com/" target="_blank" rel="noreferrer noopener">https://incredity.com/</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-93.png" alt="" class="wp-image-1829" width="376" height="181" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-93.png 701w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-93-300x145.png 300w" sizes="(max-width: 376px) 100vw, 376px" /></figure>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Elbit Systems (Cyberbit)</span></strong>, which is a military equipment company, developed a spying software called PSS Surveillance System (for PC) : <a href="https://bit.ly/3ywxlIn" target="_blank" rel="noreferrer noopener">https://bit.ly/3ywxlIn</a></p>



<p>They target mostly PC hardware. PSS is distributed via phishing attacks</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-97.png" alt="" class="wp-image-1834" width="377" height="191" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-97.png 619w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-97-300x152.png 300w" sizes="(max-width: 377px) 100vw, 377px" /><figcaption>Full PSS brochure here : <a href="https://bit.ly/3fawaXq" target="_blank" rel="noreferrer noopener">https://bit.ly/3fawaXq</a></figcaption></figure>



<p>There are very good informations about PSS here : <a href="https://bit.ly/349Efp8" target="_blank" rel="noreferrer noopener">https://bit.ly/349Efp8</a></p>



<p>Here is a <strong><span class="has-inline-color has-vivid-cyan-blue-color">Google Docs</span></strong> table of known zero-day : <a href="https://bit.ly/3ywSiDa" target="_blank" rel="noreferrer noopener">https://bit.ly/3ywSiDa</a></p>



<p>It provides an overview of major zero-day globally, where we find NSO zero-day</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-94-1024x90.png" alt="" class="wp-image-1830" width="692" height="61" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-94-1024x90.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-94-300x27.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-94-768x68.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-94.png 1437w" sizes="(max-width: 692px) 100vw, 692px" /><figcaption>Table filtered on NSO Group zero-days</figcaption></figure>



<p>Zero-day are difficult to find and hackers are trying to sell their research to private companies (such as Incredity) or to government agencies. Sometimes, governments launch covert calls to researchers to supply zero-day</p>



<p>Israel does this, and some years ago, a Request For Information (RFI) was disclosed to the public : <a href="https://bit.ly/3f9licb" target="_blank" rel="noreferrer noopener">https://bit.ly/3f9licb</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-95.png" alt="" class="wp-image-1831" width="474" height="601" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-95.png 641w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-95-237x300.png 237w" sizes="(max-width: 474px) 100vw, 474px" /><figcaption>Source : <a href="https://bit.ly/3oDACBc" target="_blank" rel="noreferrer noopener">https://bit.ly/3oDACBc</a></figcaption></figure>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-96.png" alt="" class="wp-image-1832" width="437" height="359" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-96.png 596w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-96-300x247.png 300w" sizes="(max-width: 437px) 100vw, 437px" /><figcaption>Source : <a href="https://bit.ly/3oDACBc" target="_blank" rel="noreferrer noopener">https://bit.ly/3oDACBc</a></figcaption></figure>



<p>According to a report from Fireeye, here is the year 2019 map of zero-day exploitation by hacking actors : <a href="https://bit.ly/3veuNMS" target="_blank" rel="noreferrer noopener">https://bit.ly/3veuNMS</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-98-1024x621.png" alt="" class="wp-image-1837" width="613" height="371" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-98-1024x621.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-98-300x182.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-98-768x466.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-98.png 1234w" sizes="(max-width: 613px) 100vw, 613px" /></figure>



<p>Israel has the NSO Group zero-day in the list, but other known cyber majors are beyond (China, Russia, USA, UAE,&#8230;)</p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Attacks from Israel</span></strong></p>



<p>Israel uses offensive security as a standalone action, or in combination of kinetic force</p>



<p>Here below a summary of some known attacks :</p>



<figure class="wp-block-table is-style-regular"><table><thead><tr><th class="has-text-align-center" data-align="center">       <span class="has-inline-color has-vivid-cyan-blue-color">Date</span></th><th class="has-text-align-center" data-align="center">   <span class="has-inline-color has-vivid-cyan-blue-color">Target</span></th><th>                                 <span class="has-inline-color has-vivid-cyan-blue-color">Summary</span></th><th>                  <span class="has-inline-color has-vivid-cyan-blue-color">Link</span></th></tr></thead><tbody><tr><td class="has-text-align-center" data-align="center">10/2007</td><td class="has-text-align-center" data-align="center"><strong>Syria</strong></td><td>Hack air defenses</td><td><a href="https://bit.ly/3hJDQ4F" target="_blank" rel="noreferrer noopener">https://bit.ly/3hJDQ4F</a></td></tr><tr><td class="has-text-align-center" data-align="center">03/2009</td><td class="has-text-align-center" data-align="center"><strong>Syria</strong></td><td>Malware loaded into the PC of a Syrian government official</td><td><a href="https://bit.ly/3vapkGW" target="_blank" rel="noreferrer noopener">https://bit.ly/3vapkGW</a></td></tr><tr><td class="has-text-align-center" data-align="center">11/2011</td><td class="has-text-align-center" data-align="center"><strong>Palestine</strong></td><td>Control of the digital infrastructure</td><td><a href="https://bit.ly/34gL2wZ" target="_blank" rel="noreferrer noopener">https://bit.ly/34gL2wZ</a></td></tr><tr><td class="has-text-align-center" data-align="center">06/2012</td><td class="has-text-align-center" data-align="center"><strong>Iran</strong></td><td>Stuxnet malware</td><td><a href="https://bit.ly/34hIOhe" target="_blank" rel="noreferrer noopener">https://bit.ly/34hIOhe</a></td></tr><tr><td class="has-text-align-center" data-align="center">10/2013</td><td class="has-text-align-center" data-align="center"><strong>France</strong></td><td>Hack of the Elysée</td><td><a href="https://bit.ly/2Th6IXX" target="_blank" rel="noreferrer noopener">https://bit.ly/2Th6IXX</a></td></tr><tr><td class="has-text-align-center" data-align="center">10/2013</td><td class="has-text-align-center" data-align="center"><strong>France</strong></td><td>Surveillance of many mobile phones</td><td><a href="https://bit.ly/3wsDcwp" target="_blank" rel="noreferrer noopener">https://bit.ly/3wsDcwp</a></td></tr><tr><td class="has-text-align-center" data-align="center">12/2018</td><td class="has-text-align-center" data-align="center"><strong>Lebanon</strong></td><td>Access to Lebanses mobile phones to issue warning messages</td><td><a href="https://bit.ly/3bNbVNr" target="_blank" rel="noreferrer noopener">https://bit.ly/3bNbVNr</a></td></tr><tr><td class="has-text-align-center" data-align="center">11/2019</td><td class="has-text-align-center" data-align="center"><strong>India</strong></td><td>Hack of opposition mobile phones during elections using NSO Pegasus</td><td><a href="https://bit.ly/3473PuV" target="_blank" rel="noreferrer noopener">https://bit.ly/3473PuV</a></td></tr><tr><td class="has-text-align-center" data-align="center">12/2019</td><td class="has-text-align-center" data-align="center"><strong>Pakistan</strong></td><td>Hack of executives mobile phones  using NSO Pegasus. India suspected</td><td><a href="https://bit.ly/3fJLN7r" target="_blank" rel="noreferrer noopener">https://bit.ly/3fJLN7r</a></td></tr><tr><td class="has-text-align-center" data-align="center">05/2020</td><td class="has-text-align-center" data-align="center"><strong>Iran</strong></td><td>Hack of port to disrupt operations</td><td><a href="https://nyti.ms/2SimaCC" target="_blank" rel="noreferrer noopener">https://nyti.ms/2SimaCC</a></td></tr><tr><td class="has-text-align-center" data-align="center">06/2020</td><td class="has-text-align-center" data-align="center"><strong>Morocco</strong></td><td>Hack of opponents mobile phones using NSO Pegasus</td><td><a href="https://bit.ly/2Rxuy15" target="_blank" rel="noreferrer noopener">https://bit.ly/2Rxuy15</a></td></tr><tr><td class="has-text-align-center" data-align="center">12/2020</td><td class="has-text-align-center" data-align="center"><strong>Al Jazeera</strong></td><td>Hack of journalists mobile phones using NSO Pegasus</td><td><a href="https://bit.ly/3feTOSQ" target="_blank" rel="noreferrer noopener">https://bit.ly/3feTOSQ</a></td></tr><tr><td class="has-text-align-center" data-align="center">04/2021</td><td class="has-text-align-center" data-align="center"><strong>Iran</strong></td><td>Hack of nuclear facility</td><td><a href="https://bit.ly/3ubWhla" target="_blank" rel="noreferrer noopener">https://bit.ly/3ubWhla</a></td></tr></tbody></table></figure>



<p>We can conclude that Israel has some core competencies and advantages :</p>



<ul class="wp-block-list"><li>Control of Web Infrastructure of Palestine</li><li>Expertise in SIGINT</li><li>Expertise in surveillance tools (PC, mobile phones, social networks,&#8230;)</li><li>Capacity to design advanced malware and transplant these malware in remote locations</li><li>Strong cooperation between secret services and cyber ecosystem</li></ul>



<p>Israel has for sure used these competencies to fight against Hamas during the recent <strong><span class="has-inline-color has-vivid-cyan-blue-color">operation Wall Guardian</span></strong> : <a href="https://bit.ly/34aZCq0" target="_blank" rel="noreferrer noopener">https://bit.ly/34aZCq0</a></p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Attacks against Israel</span></strong></p>



<p>Israel is also the target of frequent cyber attacks. Here below a summary of some known attacks :</p>



<figure class="wp-block-table"><table><thead><tr><th class="has-text-align-center" data-align="center">     <span class="has-inline-color has-vivid-cyan-blue-color">Date</span></th><th>  <span class="has-inline-color has-vivid-cyan-blue-color">Initiator</span></th><th>                                    <span class="has-inline-color has-vivid-cyan-blue-color">Summary</span></th><th>                <span class="has-inline-color has-vivid-cyan-blue-color">Link</span></th></tr></thead><tbody><tr><td class="has-text-align-center" data-align="center">11/2003</td><td><strong>Israeli</strong></td><td>Israeli citizen defacing the Mossad website</td><td><a href="https://bit.ly/3wtQIjm" target="_blank" rel="noreferrer noopener">https://bit.ly/3wtQIjm</a></td></tr><tr><td class="has-text-align-center" data-align="center">03/2012</td><td><strong>Gaza</strong></td><td>Web sites defaced by Gaza Hacker Team</td><td><a href="https://bit.ly/3bM1r0G" target="_blank" rel="noreferrer noopener">https://bit.ly/3bM1r0G</a></td></tr><tr><td class="has-text-align-center" data-align="center">08/2015</td><td><strong>Gaza</strong></td><td>Intelligence gathering with malware</td><td><a href="https://bit.ly/3uimnmq" target="_blank" rel="noreferrer noopener">https://bit.ly/3uimnmq</a></td></tr><tr><td class="has-text-align-center" data-align="center">02/2016</td><td><strong>Hezbollah</strong></td><td>Security camera system breach</td><td><a href="https://bit.ly/2QNB3MO" target="_blank" rel="noreferrer noopener">https://bit.ly/2QNB3MO</a></td></tr><tr><td class="has-text-align-center" data-align="center">05/2017</td><td><strong>Gaza</strong></td><td>Molerats threat group</td><td><a href="https://bit.ly/3fAxt0O" target="_blank" rel="noreferrer noopener">https://bit.ly/3fAxt0O</a></td></tr><tr><td class="has-text-align-center" data-align="center">07/2018</td><td><strong>Hamas</strong></td><td>Hack soldiers through world cup phone app</td><td><a href="https://bit.ly/3yAU0mG" target="_blank" rel="noreferrer noopener">https://bit.ly/3yAU0mG</a></td></tr><tr><td class="has-text-align-center" data-align="center">08/2018</td><td><strong>Hamas</strong></td><td>Attempt to hack Israelis with fake rocket warning app</td><td><a href="https://bit.ly/3bOJxum" target="_blank" rel="noreferrer noopener">https://bit.ly/3bOJxum</a></td></tr><tr><td class="has-text-align-center" data-align="center">03/2019</td><td><strong>Iran</strong></td><td>Hack of the mobile phone of PM candidate Benny Gantz</td><td><a href="https://bit.ly/3wqi4XK" target="_blank" rel="noreferrer noopener">https://bit.ly/3wqi4XK</a></td></tr><tr><td class="has-text-align-center" data-align="center">05/2019</td><td><strong>Hamas</strong></td><td>Eurovision hack</td><td><a href="https://bit.ly/2Te33Kn" target="_blank" rel="noreferrer noopener">https://bit.ly/2Te33Kn</a></td></tr><tr><td class="has-text-align-center" data-align="center">02/2020</td><td><strong>Unknown</strong></td><td>Massive data leak of Israeli</td><td><a href="https://bit.ly/2QK5G5D" target="_blank" rel="noreferrer noopener">https://bit.ly/2QK5G5D</a></td></tr><tr><td class="has-text-align-center" data-align="center">02/2020</td><td><strong>Hamas</strong></td><td>Soldiers attracted to download a malicious app with fake photos of women</td><td><a href="https://bit.ly/3wsbHTJ" target="_blank" rel="noreferrer noopener">https://bit.ly/3wsbHTJ</a></td></tr><tr><td class="has-text-align-center" data-align="center">05/2020</td><td><strong>Iran</strong></td><td>Attempted cyber attack on water and sewage system</td><td><a href="https://bit.ly/3wrsshL" target="_blank" rel="noreferrer noopener">https://bit.ly/3wrsshL</a></td></tr><tr><td class="has-text-align-center" data-align="center">10/2020</td><td><strong>Unknown</strong></td><td>Hack against executives of the Crypto industry</td><td><a href="https://bit.ly/2RwKssx" target="_blank" rel="noreferrer noopener">https://bit.ly/2RwKssx</a></td></tr><tr><td class="has-text-align-center" data-align="center">12/2020</td><td><strong>Iran</strong></td><td>Breach of Israel Aerospace industry</td><td><a href="https://bit.ly/3viwEjK" target="_blank" rel="noreferrer noopener">https://bit.ly/3viwEjK</a></td></tr><tr><td class="has-text-align-center" data-align="center">01/20201</td><td><strong>Hezbollah</strong></td><td>Malware attack over industries and countries</td><td><a href="https://bit.ly/34aAGz2" target="_blank" rel="noreferrer noopener">https://bit.ly/34aAGz2</a></td></tr><tr><td class="has-text-align-center" data-align="center">05/2021</td><td><strong>Iran</strong></td><td>Breach into H&amp;M computers</td><td><a href="https://bit.ly/3oQ5aji" target="_blank" rel="noreferrer noopener">https://bit.ly/3oQ5aji</a></td></tr></tbody></table></figure>



<p>We can conclude that despite its strong cyber competence, Israel has some hard time blocking hackers and preventing damages</p>



<p>Let&#8217;s keep in mind that Israel is <strong><span class="has-inline-color has-vivid-cyan-blue-color">highly exposed</span></strong>, as many Israeli have access to the Internet, are using social networks and mobile phones</p>



<p>It is very difficult to stop such attacks. We will surely see more data breaches, ransomware, malicious apps targeting Israeli</p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-red-color">Conclusion</span></strong></p>



<p>Let&#8217;s conclude this article. Israel has a unique and complexe strategic position, and Cyber has long been at the heart of Israel defense and attack tactics. It shall continue !</p>



<p>Here is a prospective study, highlighting what could be facing <strong><span class="has-inline-color has-vivid-cyan-blue-color">Israel in the next two decades</span></strong> : <a href="https://brook.gs/3eNHeZ5" target="_blank" rel="noreferrer noopener">https://brook.gs/3eNHeZ5</a></p>



<p>Here below an excerpt :</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-10.png" alt="" class="wp-image-1630" width="390" height="108" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-10.png 851w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-10-300x84.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-10-768x214.png 768w" sizes="(max-width: 390px) 100vw, 390px" /></figure>



<p>Israel will have to continue defending the country and the people, keeping a <strong><span class="has-inline-color has-vivid-cyan-blue-color">technological advantage</span></strong></p>



<p>The <strong><span class="has-inline-color has-vivid-cyan-blue-color">Information Warfare</span></strong> will be important, and Israel will use its cyber capabilities to inform, fight fake news, deter, and more</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/05/image-46.png" alt="" class="wp-image-1737" width="293" height="343" srcset="https://www.forensicxs.com/wp-content/uploads/2021/05/image-46.png 819w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-46-256x300.png 256w, https://www.forensicxs.com/wp-content/uploads/2021/05/image-46-768x900.png 768w" sizes="(max-width: 293px) 100vw, 293px" /><figcaption><a href="https://electronicintifada.net/" target="_blank" rel="noreferrer noopener">https://electronicintifada.net/</a></figcaption></figure>



<p>They had better do it, and do it well, as the opponents of Israel are also using Internet for their needs. International opinions will be strongly influenced by the right propaganda</p>



<p>In my opinion, Israel can lead the information warfare, not only because of technology, but also with an <strong><span class="has-inline-color has-vivid-cyan-blue-color">Ethical</span></strong> behaviour. This will probably be key to persuade international opinions that Israel does the right things and takes legitimate actions</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.forensicxs.com/israel-and-the-web/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching 44/50 queries in 0.009 seconds using Disk

Served from: www.forensicxs.com @ 2026-01-01 18:14:03 by W3 Total Cache
-->