{"id":35104,"date":"2020-05-21T11:38:02","date_gmt":"2020-05-21T11:38:02","guid":{"rendered":"http:\/\/b3251bb0-34a7-4e0b-ab71-33ca95a9f65d"},"modified":"2020-05-21T11:38:02","modified_gmt":"2020-05-21T11:38:02","slug":"thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/","title":{"rendered":"Thousands of Israeli sites defaced with code seeking permission to access users&#8217; webcams"},"content":{"rendered":"<p>Thousands of Israeli websites have been defaced earlier today to show an anti-Israeli message and with malicious code seeking permission to access visitors&#8217; webcams.<\/p>\n<p>More than 2,000 websites are believed to have been defaced. Most of the websites were hosted on uPress, a local Israeli WordPress hosting service.<\/p>\n<p><a href=\"https:\/\/www.facebook.com\/upress.il\/posts\/1441563606025668\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">In a message posted on Facebook<\/a>, the company said the hackers exploited a vulnerability in a WordPress plugin to plant the defacement message on Israeli sites hosted on its platform.<\/p>\n<p>The company said it was working with Israeli authorities to investigate the hack. uPress also took down all defaced websites and pulled the file hackers were exploiting. Efforts are currently underway to restore all affected sites.<\/p>\n<p>The attack was carried out by a new hacker group going by the name of &#8220;Hackers of Savior.&#8221; According to a Facebook group, the hacker group is believed to have nine members, all from Muslim countries, such as Turkey, Palestine, Morocco, and Egypt.<\/p>\n<p>The attacks have been timed to take place on &#8220;Jerusalem Day,&#8221; an Israeli national holiday commemorating the reunification of the city of Jerusalem and the establishment of Israeli control over the Jerusalem Old City in 1967.<\/p>\n<p>On all websites, hackers loaded a YouTube video along with the message of &#8220;The countdown of Israel destruction has begun since a long time ago&#8221; [<a href=\"https:\/\/www.youtube.com\/watch?v=-8eduJrCWEA\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">see video here<\/a>].<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/21\/45e29d73-bbbe-48bf-ab92-fc23e1cb0336\/israeli-defaced-site.jpg\" class alt=\"israeli-defaced-site.jpg\"><\/span> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The site also loaded a script that requested access to users&#8217; webcams. According to <a href=\"https:\/\/twitter.com\/GelosSnake\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Omri Segev Moyal<\/a>, CEO of cyber-security firm <a href=\"https:\/\/profero.io\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Profero<\/a>, two versions of this script were delivered, with a second containing code that tried to take a photo of the user and upload it to a remote server.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/\" class=\"lazy\" alt=\"israel-web-defacements.png\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/21\/3fa80e89-954f-43d9-808b-eafac430fa5f\/israel-web-defacements.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/21\/3fa80e89-954f-43d9-808b-eafac430fa5f\/israel-web-defacements.png\" class alt=\"israel-web-defacements.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>The Israeli National Cyber-Directorate (INCD), the country&#8217;s cyber-security agency, warned users against interacting with any of the hacked websites.<\/p>\n<div class=\"twitterContainer\" readability=\"7.2995545657016\">\n<blockquote class=\"twitter-tweet\" readability=\"7.7861915367483\">\n<p lang=\"iw\" dir=\"rtl\">\u05d0\u05e0\u05d5 \u05de\u05e2\u05d3\u05db\u05e0\u05d9\u05dd \u05db\u05d9 \u05d1\u05e9\u05e2\u05d5\u05ea \u05d4\u05d0\u05d7\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4\u05ea\u05e7\u05d1\u05dc\u05d5 \u05d3\u05d9\u05d5\u05d5\u05d7\u05d9\u05dd \u05d1\u05de\u05e2\u05e8\u05da \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05dc\u05d0\u05d5\u05de\u05d9 \u05d0\u05d5\u05d3\u05d5\u05ea \u05d0\u05ea\u05e8\u05d9 \u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8 \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05e9\u05d4\u05d5\u05e9\u05d7\u05ea\u05d5 \u05e2\u05dd \u05de\u05e1\u05e8\u05d9\u05dd \u05d0\u05e0\u05d8\u05d9-\u05d9\u05e9\u05e8\u05d0\u05dc\u05d9\u05d9\u05dd. \u05d4\u05e0\u05d5\u05e9\u05d0 \u05de\u05d8\u05d5\u05e4\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05d4\u05de\u05e2\u05e8\u05da. \u05d0\u05e0\u05d5 \u05de\u05de\u05dc\u05d9\u05e6\u05d9\u05dd \u05dc\u05d2\u05d5\u05dc\u05e9\u05d9\u05dd \u05dc\u05d4\u05d9\u05de\u05e0\u05e2 \u05de\u05dc\u05d7\u05d9\u05e6\u05d4 \u05e2\u05dc \u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05d1\u05de\u05d9\u05d3\u05d4 \u05e9\u05d2\u05d5\u05dc\u05e9\u05d9\u05dd \u05dc\u05d0\u05ea\u05e8 \u05e9\u05d4\u05d5\u05e9\u05d7\u05ea.<\/p>\n<p>\u2014 Cyber Israel (@Israel_Cyber) <a href=\"https:\/\/twitter.com\/Israel_Cyber\/status\/1263394768601710593?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">May 21, 2020<\/a><\/p><\/blockquote>\n<\/div>\n<p>Most of the websites have been taken down, but a few are still available online, most likely still cached by CDN providers.<\/p>\n<p>Israeli news media is reporting that the attack has been carried out by &#8220;Iranian hackers,&#8221; but multiple sources have told ZDNet there is no evidence of the Iranian government&#8217;s involvement.<\/p>\n<p>Last month, <a href=\"https:\/\/www.zdnet.com\/article\/israel-says-hackers-are-targeting-its-water-supply-and-treatment-utilities\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Israel government told water treatment companies to change passwords<\/a> after hackers tried to access water supply and treatment systems. This attack, too, was blamed on Iran, using non-public sources, and against the general opinion of the Israeli cyber-security community.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The hacks have been linked back to a local Israeli WordPress hosting provider.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35105,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-35104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Thousands of Israeli sites defaced with code seeking permission to access users&#039; webcams 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thousands of Israeli sites defaced with code seeking permission to access users&#039; webcams 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-21T11:38:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"492\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Thousands of Israeli sites defaced with code seeking permission to access users&#8217; webcams\",\"datePublished\":\"2020-05-21T11:38:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/\"},\"wordCount\":410,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/\",\"name\":\"Thousands of Israeli sites defaced with code seeking permission to access users' webcams 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg\",\"datePublished\":\"2020-05-21T11:38:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg\",\"width\":1000,\"height\":492},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Thousands of Israeli sites defaced with code seeking permission to access users&#8217; webcams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Thousands of Israeli sites defaced with code seeking permission to access users' webcams 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/","og_locale":"en_US","og_type":"article","og_title":"Thousands of Israeli sites defaced with code seeking permission to access users' webcams 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-21T11:38:02+00:00","og_image":[{"width":1000,"height":492,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Thousands of Israeli sites defaced with code seeking permission to access users&#8217; webcams","datePublished":"2020-05-21T11:38:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/"},"wordCount":410,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/","url":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/","name":"Thousands of Israeli sites defaced with code seeking permission to access users' webcams 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg","datePublished":"2020-05-21T11:38:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams.jpg","width":1000,"height":492},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/thousands-of-israeli-sites-defaced-with-code-seeking-permission-to-access-users-webcams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Thousands of Israeli sites defaced with code seeking permission to access users&#8217; webcams"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35104"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35104\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35105"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}