Cyberattack on Iranian port attributed to Israel.
The New York Times reports that Israel was behind a cyberattack on May 9th against Iran's Shahid Rajaee port in the Strait of Hormuz. The paper cites "high-ranking intelligence officials and experts in the Middle East who are kept informed of covert Israeli actions in the region" as saying the attack was a "direct response" to a failed cyberattack allegedly launched by Iran against an Israeli water facility in April. The Iranian-linked attack wouldn't have caused much damage even if it had been successful, and the Times says Israel's response was intentionally proportionate: the port's computer systems were knocked offline, causing widespread disruptions to shipping traffic, but leaving no physical or permanent damage. The Washington Post reports that the effects of the attack were more serious than Iranian officials have indicated, however. The Post cites satellite imagery showing "dozens of loaded container ships" waiting off the coast days after the attack took place.
Israeli websites defaced.
On Thursday, more than 2,000 Israeli websites were defaced with an anti-Israeli YouTube video along with code that asked for permission to use visitors' webcams, ZDNet reports. In some cases, the code attempted to take a picture of the user and send it to a remote server. The majority of the affected sites were hosted on the Israeli WordPress hosting service uPress. uPress stated that the attackers made use of a vulnerability in a WordPress extension.
Multiple media outlets initially attributed the attacks to Iran, but Haaretz and others say there's no evidence to back this up. The hacks were claimed by a group calling itself "Hackers of Saviour," and were apparently timed to coincide with the start of Jerusalem Day on May 21st. Check Point told Haaretz that the group appears to be operating from Turkey, the Gaza Strip, and North Africa.