Cyberattack on Hezbollah preparation likely took months, expert says

Technology

The mysterious beeper explosions on Tuesday that wounded over 3,600 people in Lebanon, mostly Hezbollah terrorists, were the result of extensive planning, according to an Israeli cyber expert. The operation, he said, involved embedding components within the beepers that could translate signals into ignition and detonation.

“In the world of cyber, there’s a concept known as the ‘supply chain,'” explained Oleg Brodt, Director of Research, Development, and Innovation at Ben-Gurion University’s Cyber Labs, speaking to Maariv.

“Many attacks occur by compromising the supply chain. An electronic device, like a beeper, contains numerous components, and each one could be infected with malware. This malware could be designed to raise the device’s temperature, cause a malfunction, ignite it, or even trigger an explosion.”

Brodt noted that this type of operation is familiar in intelligence circles and requires significant cooperation from organizations involved in the manufacturing process. These groups ensure that the malicious components are embedded or replaced without being detected by quality control.

“In such cases, it’s essential to make the changes to the device without raising suspicion during the quality inspection,” he emphasized.

Kill switch

One potential method used is a feature known in the cyber world as a “kill switch.” In this scenario, malicious software is designed to detonate the device at a specific time or in response to a particular message sent to the beeper.

“It’s possible to set up a non-standard message—something unusual or even gibberish—broadcast to hundreds or thousands of devices at once, causing simultaneous ignition and explosion,” Brodt explained. “The radio waves received by the device are translated into a unique message that triggers a chain of events leading to the explosion.”

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *