You are exploring the Free preview.
To unlock full read-only access to all public profiles and in-app notifications,
create a free research account.
For analyst / premium plans capabilities (editing, advanced tabs, exports),
please
contact us
Anonymous Israel / Anonymous #OpIsrael Participants is a hacktivist cluster associated with pro-Palestinian Anonymous-branded campaigns targeting Israeli and allied entities. Activity is characterized by DDoS against public-facing services, external web and social-media defacements, and theft/leakage of credentials and personal data from compromised sites. Campaigns are often announced publicly (e.g., 'electronic holocaust') and timed with Gaza conflicts or symbolic dates, with impact skewed toward smaller or less-protected organizations rather than hardened national infrastructure.
Technique
Technique name
Tactics
Evidence
T1491.002
External Defacement
TA0040
2015-04-06 —
OpIsrael wave: Anonymous and AnonGhost defaced multiple Israeli government and business websites, replacing content with pro-Palestinian messages as part of a coordinated campaign. · ref
2015-04-07 —
Media reporting on the April 7 OpIsrael campaign describes dozens of Israeli websites, including a Knesset member's site and other small organizations, being defaced with pro-Palestinian slogans and Anonymous/AnonGhost signatures. · ref
2014-07-31 —
CSIDB documents defacement of multiple Connecticut government portals with pro-Palestine messages under an OpSaveGaza/OpIsrael-related campaign attributed to the same hacktivist cluster. · ref
2015-07-13 —
Malaysian Police social-media accounts were taken over and profile imagery replaced with ideological content by AnonGhost, cataloged under Anonymous #OpIsrael Participants, demonstrating defacement of external-facing accounts. · ref
T1498.001
Direct Network Flood
TA0040
2015-04-06 —
CSIDB describes an OpIsrael operation where Anonymous and AnonGhost used DDoS attacks alongside defacements against Israeli government and commercial websites, disrupting availability. · ref
2015-04-07 —
News coverage of OpIsrael 2015 notes that pro-Palestinian hackers launched denial-of-service attacks on Israeli sites after Anonymous threatened an 'electronic holocaust' targeting government, military and financial infrastructure. · ref
2015-04-07 —
Campaign summaries of #OpIsrael2015 indicate claims of hundreds of sites attacked and DDoS actions advertised under the OpIsrael hashtag, with Israeli sources characterizing impact as limited but noting attempted floods. · ref
T1190
Exploit Public-Facing Application
TA0001
2014-09-08 —
An OpIsrael-aligned incident lists an Israeli Ministry of Education subdomain being compromised and defaced by AnonGhost, implying exploitation of a vulnerable public-facing web application to alter site content. · ref
2015-05-03 —
Red Bull Malaysia’s official website was hacked and defaced by AnonGhost in an attack cataloged under Anonymous #OpIsrael Participants, indicating exploitation of the public-facing site to gain write access to web content. · ref
2015-01-21 —
CSIDB records defacement of French Interior/Defense ministry sites by AnonGhost as part of the same cluster; compromise of ministry web properties suggests exploitation of public web applications. · ref
T1589.001
Credentials
TA0043
2015-04-06 —
A documented OpIsrael campaign against Israeli government and business sites resulted in the leak of personal data for roughly 150,000 Israeli citizens, including names, contact details and other identifying information. · ref
2015-04-07 —
Contemporary reporting on #OpIsrael2015 states that attackers claimed to have published phone numbers and addresses for Israeli officials along with other citizen data as part of their campaign. · ref
T1589.003
Employee Names
TA0043
2015-04-06 —
CSIDB describes the same OpIsrael wave leaking thousands of credentials, including more than 2,000 PayPal logins, as well as account data tied to banks and other financial services in Israel. · ref
2015-04-07 —
Hacktivists behind #OpIsrael2015 publicly boasted of leaking large volumes of social media and PayPal credentials associated with Israeli targets, consistent with collection of financial and account identity data. · ref
T1078.003
Local Accounts
TA0001TA0003TA0004TA0005
2015-07-13 —
The Malaysian Police Facebook and Twitter accounts were compromised and controlled by AnonGhost, changing profile images and messaging; this incident is attributed to Anonymous #OpIsrael Participants and demonstrates abuse of valid web accounts. · ref
2015-04-07 —
Reporting on OpIsrael notes that some Israeli Facebook accounts and smaller online properties were taken over and used to spread pro-Palestinian or Anonymous-branded messages, indicating use of compromised valid credentials. · ref
T1585.001
Social Media Accounts
TA0042
2015-04-07 —
The #OpIsrael2015 campaign used dedicated Anonymous-branded social media accounts (e.g., @Op_Israel) to announce operations, publish results and coordinate messaging, reflecting pre-established hacktivist social-media personas. · ref
2015-03-31 —
News outlets covering the 'electronic holocaust' threat reference a video message and Anonymous-branded online channels created to threaten and mobilize against Israeli targets ahead of the April 7 OpIsrael wave. · ref
T1587.001
Malware
TA0042
2015-04-07 —
Anonymous/OpIsrael actors have historically distributed DDoS tools and scripts to volunteers to participate in attacks, as documented in coverage of OpIsrael waves that reference packaged tools aimed at non-expert supporters. · ref