.
Hackers hit Israel with mass Cyber Attack over Gaza: http://thehackernews.com/2012/11/opisrael-hackers-hit-israel-with-mass.html
'Israel said that it generally experiences a few hundred hacking attempts per day. The attacks are reportedly coming from around the world.
Defence force sites have been the hardest hit, while the president’s site has been hit 10-million times, the foreign ministry seven-million times and the prime minister three-million times.
Both sides have been active on social media, with the Israeli Defence Force (IDF) going so far as to live blog some of its manoeuvres on Palestine. Combatants and civilians in Palestine meanwhile have been more active on Twitter, receiving support from hacker collective Anonymous.
Among the group's other high-profile targets were the websites of Israel's Kadima Party, which was taken offline shortly after being hacked, and Bank of Jerusalem. Most of the sites that were hacked appeared to be unavailable, but others displayed pro-Palestinian images and messages.'
Read on pakbugs.com : http://pakbugs.com/index
'[#] PAKbugs is a hacking community with professional black hat hackers from around the world but mostly from Pakistan & Saudi Arabia. PAKbugs was established in late 2007.
The founder of PAKbugs was Zombie_KsA. Zombie_KsA is well known in internet world by his defacement and hacking skills. The major defacement made by Zombie_KsA was Google Morocco.
[#] so how did they manage to deface these co.il domains? guess (DNS poisoning? nah i don't think so these skids ain't that good)
well when i first saw these defaced co.il domains i knew it was SQLi so i began to search (=
[#] First i went and check Whois of msn.org.il -http://whois.domaintools.com/msn.co.il
[#] Ok, great now we know that Microsoft registered these domains on http://www.galcomm.co.il/ so there must be a hole in this website otherwise its not possible (= "these skids can't hack Microsoft servers"
[#] lets check www.galcomm.co.il, after 5 minutes we found exact vulnerable link where we can easily Inject on this website Through MsSQL Injection, and very easy to extract LoginID and Passwords, for any account registered on galcomm.co.il
for security reasons we are not disclosing exact injectable links,and we have informed right authorities about vulnerability, but we can show some example, website is poorly coded in .NET
[#] well, i guess here it ends, so you see how simple it was huh? so Khantastic Script kiddie, stop using my name stop scamming other ppl using my handle, make your own,
And ah! i almost forgot these skids copied my Index as well which i used in 2010 when i defaced NR3C, here's link: http://www.zone-h.org/mirror/id/10093092
how skids they are they even copied my index! c'mon who does that? huh? you guys can't even make an index? and oh i wanna tell one more thing that Zombie_KsA ( Me )
I DON'T DEFACE ANYMORE! I keep access on servers only! i dont deface anymore
'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
Cyberattack against Israeli and Palestinian targets for a year : on blogs.norman.com : http://blogs.norman.com/2012/security-research/cyberattack-against-israeli-and-palestinian-targets-for-a-year
'.. Recently, media reported of a targeted attack against the Israeli government, in the form of emails purporting to come from IDF Chief of Staff Benny Gantz, where the email contained a malicious attachment.
We located this file. It was signed with a fake digital certificate. In the following investigation we first found several other trojans similarly signed, then many more trojans connecting to the same command & control structure as the first batch. Many of these contained bait documents and video to attract attention (and clicks). These baits are in English or Hebrew and touch on issues interesting for an Israeli audience.' ..