Threat profileIsrael

Israel can be considered as one of the world's leading cyber powers. It was one of the first countries to acknowledge the importance of cyber in modern day conflict. It has also faced innumerous cyber-attacks since then. Its offensive activities in cyberspace can be characterized by quality over volume. A limited number of highly targeted and sophisticated operations is attributed to Israel. These operations are in line with their political and security interests. Furthermore, Israel has developed a unique ecosystem of public-private cooperation that led to the creation of a vibrant cyber security tech-industry. This has created a fruitful ground for further capability development.

Request a free membership to access our full research insights

Already a member? Login here
  • Strategic motives: Espionage, information theft, disruption
  • Strategic goals: Becoming a leading nation in cyberspace; mitigating regional threats; achieving regional cyber superiority
  • Cyber capabilities: ★★★★☆
  • Number of known cyber operations: ★☆☆☆☆
  • Number of APTs: 11

Top-5 Actors

By amount of operations

Israeli APTs

OUR OBSERVATIONS

0

Advanced Persistent Threats (APTs)

0

Tactics, Techniques & Procedures (TTPs)

0

Attack tools

SWOT analysis

Strengths, weaknesses, opportunities & threats

Strengths

  • Advanced defensive and offensive cyber capabilities
  • Close cooperation between the government, private industry and academic sector
  • One of the most competitive cyber industries in the world
  • Large pool of human capital

Weaknesses

  • Their technology and solutions will not be trusted by every nation and may hinder growth potential
  • Reputational damage from organizations like NSO

Opportunities

  • Developing increasingly sophisticated cyber capabilities through investments in the Israeli IT sector
  • Creating technological advantages by testing cyber capabilities on actual 'battlegrounds' before bringing them onto the global market

Threats

  • Constantly under attack by regional adversaries
  • The close relation (and arguably integration) between intelligence agencies and the cyber tech-sector may backfire (e.g. NSO)s

Interested in our fully detailed country analysis?

Already a member? Login here

Learn more about our threat research?