Iranian hackers on Tuesday released files allegedly containing private information on hundreds of IDF soldiers.
The files leaked by a hacking group called “Moses Staff” also contain details of an IDF combat brigade’s deployment, including job descriptions, a full list of names, email addresses, phone numbers, and home addresses of members of the brigade.
Photos of Defense Secretary Benny Gantz were posted by the group on Monday, along with threats that he was being monitored by the hackers.
“We know every decision you make and take it where you least expect it. We have secret Department of Defense documents, operational military maps and information about troop deployments and we will make your crimes known to the world, “the hackers said in their post.
All information was published on the dark web and in groups of the Telegram messaging app.
Some files contain details of IDF reserve soldiers and military units, including names, ranks, military roles, and their correspondence with their units explaining why they were unable to show up for duty.
Other files contain information about thousands of teenagers seeking to enroll for the IDF, including those in pre-service programs.
In addition to names, addresses and telephone numbers, the files contain sensitive personal information such as psychological information and the socio-economic status of the soldiers’ families.
The group’s hacks are carried out through the use of bots and include warnings such as “Your end is near”.
Moses Staff also published a series of leaks that contained databases of information on thousands of Israelis stolen from the computers of a number of private companies. Cyber security experts say these hacks are aimed at impacting awareness, just like the groups that hacked the Shirbit company in December 2020.
The leaks of the new group are marked by explicitly aggressive texts such as “We will fight on until we discover your hidden crimes, your end is near.”
Israel’s National Cyber Directorate said Wednesday it had warned of the risk posed by security weaknesses in some organizations.
“We encourage companies to implement the latest critical updates that Microsoft has released to address these vulnerabilities. This is a simple, free update that can reduce the risk of this attack. “