Cytegic DyTATM intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTATM enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geo-political region, industry sector and corporate assets.
The following post explores the trends and patterns identified by DyTATM regarding “OpIsrael” (April 2015).
This is an excerpt from our Monthly report. For the complete report please write to
As in previous years, the Anonymous collective’s Arab and Muslim affiliates, led by AnonGhost, conducted their annual OpIsrael campaign which peaked on April 7th. And again, as in previous years, the campaign ended with a whimper, without any major success or achievement. Actually, this year’s campaign was even less successful than previous ones, perhaps due to better preparations on the Israeli side, and perhaps due to the abundance of ongoing campaigns conducted by the same attackers (against ISIS, against Al-Qaeda, surrounding the conflict in Yemen, to name a few). Nevertheless, there were some interesting things that popped out of the graphs:
- The attacks started to become severe a week before April 7th and in some cases lasted until, and even peaked, a week after.
- The IT sector (ISPs included) was predominant, followed by the likely suspects – media, banks and government. Looking at the daily view, the attacks on the IT sector had a strengthening wave pattern, with a couple of days between each wave.
- As usual, the top attack methods employed by the hacktivists were resource depletion, social engineering, defacements, injections and malware of different sorts