the Handala hacking group has claimed responsibility for breaching the air-gapped network of the Elad Municipality in Israel.
The group alleges that they have compromised over 3 terabytes (TB) of confidential data, including sensitive information such as identity details, geographic coordinates, and contracts.
The incident has raised concerns about the security of critical municipal infrastructure and the effectiveness of air-gapped networks, which are typically isolated from the internet to prevent cyberattacks.
Massive Data Compromise and System Wipe
According to reports from FalconFeeds.io, the breach involved accessing the municipality’s main database, which contained a vast amount of sensitive information.
The group asserts that they not only stole 3TB of data but also wiped key systems, including the municipality’s main file and database servers. Employee systems were also reportedly targeted and erased.
If true, this would represent one of the most severe cyberattacks on a local government entity in recent memory, with potential long-term consequences for both municipal operations and residents whose personal data may have been exposed.
The stolen data allegedly includes identity details of residents, geographic coordinates related to municipal planning or infrastructure, and contracts that could contain sensitive financial or legal information.
The full scope of the breach remains unclear as officials have yet to confirm or deny Handala’s claims.
Air-Gapped Network Security in Question
The most alarming aspect of this breach is Handala’s claim that they penetrated an air-gapped network—an isolated system designed specifically to protect sensitive information from external threats by physically separating it from internet-connected networks.
Air-gapped systems are often used in highly sensitive environments like government agencies or military installations due to their robust security posture.
If Handala’s claims are verified, it would suggest that even air-gapped networks are not immune to sophisticated cyberattacks.
This could lead to a reevaluation of how such networks are protected and raise questions about whether additional layers of security are needed to safeguard critical infrastructure.
Also Read: