A Study in Cyber Attack Defense Contrasts: Op Ababil vs OpIsrael

There is no doubt that the last couple of months have been historic in the world of cyber security. In October, it was US banks and financial institutions that faced a barrage of cyber attacks during “Operation Ababil.” In November, Israeli websites came under fire during the Anonymous led “OpIsrael” attacks. However, there is a stark contrast in the effectiveness of these two attack operations. While the banking attacks were by-and-large successful, the attacks on Israeli websites fell short.

Of course the question for security experts is – how do we explain this disparity? Is it because the financial sector didn’t have enough resources or serious professionals dedicated to program management? Is it because the Israeli government possessed a cyber defense strategy that was executed flawlessly? In truth, neither scenario seems likely and the real answer may make some a bit uncomfortable.

The reality is that attack mitigation is not a core competency of modern day security programs. The problem is that it’s those of us who expect they will experience a cyber attack that end up in better shape than those who don’t. Yes, when it comes to cyber security, paranoia is a virtue!

Take the following example: have you as a security professional ever tested your environment for a cyber attack? Do you know how to mitigate them? (No, these aren’t modern day “Pen Tests” which don’t test ‘service disrupting techniques’) I would argue that during OpAbabil the US banks were more concerned with compliance and data leakage (both very important attributes of a security program) than with the notion of defending against a cyber attack. But they should have been.

Now, let’s shift gears from whether or not a security program should be prepared for an attack to the question of vulnerabilities. Suppose we ask, “how do you mitigate vulnerabilities?” Well, that question is easier to answer and probably makes people more comfortable. But today’s risks are not about individual threats or single vulnerabilities. They are a cacophony of trialed threat and exploit vectors — something we term as an “attack.” Given the fact that cyber security world has changed over the past two years to an attack based model that has its own new attributes the important question to ask is – have you changed to adapt your control infrastructure to these new techniques?

In light of these changes, here’s the call to action: it’s high time we, as security professionals, begin the process of not only dealing with individual vulnerabilities but also diving deep into popular attack types, schemes, and tools (e.g. platforms) in order to prepare ourselves with better and more competent responses. These attacks are unique and represent a new under-studied are for information security programs. The graphic below helps explain this concept on a deeper level. To be sure, attacks do have a relationship with vulnerabilities, but it is clear we are now dealing with a different animal altogether!


Carl Herberger

Carl is an IT security expert and responsible for Radware’s global security practice. With over a decade of experience, he began his career working at the Pentagon evaluating computer security events affecting daily Air Force operations. Carl also managed critical operational intelligence for computer network attack programs to aid the National Security Council and Secretary of the Air Force with policy and budgetary defense. Carl writes about network security strategy, trends, and implementation.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program


An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center