Already disgraced by a spate of hackers’ attacks, which led to an extensive leak of information related to Israel’s critical facilities and top political figures, the regime’s claims to intelligence invulnerability has been further debunked by a new report that a man working as a cleaner in the home of the Israeli minister of military affairs has been allegedly accused of spying for Iran.
According to an indictment published by Israel’s so-called justice ministry, Omri Goren Gorochovsky, a cleaner in the home of Israeli minister of military affairs Benny Gantz, was arrested on November 4.
Gorochovsky, a 37-year-old resident of the central city of Lod, was charged on Thursday with attempting to spy for the Black Shadow hacking group, which is alleged to be linked to Iran.
The indictment alleged that Gorochovsky and his partner worked as cleaners in Gantz’s home in Rosh Haayin outside Tel Aviv, AFP reported.
Late last month, Black Shadow broke into the servers of Israeli internet hosting company Cyberserve, bringing down a number of widely-used websites and warning the firm that it was in possession of data that could be leaked.
Following last month’s cyberattack, Gorochovsky allegedly contacted Black Shadow, offering to pass on information from Gantz’s home, sending photographs of various items in the Israeli minister’s house to prove his credibility as an insider.
The report comes a day after the identity of a senior Israeli official who was involved in cyberattacks on Iran was revealed.
According to a report by Fars news agency, the Israeli officer identified as Ohad Zeidenberg was working in the so-called “Unit 8200,” which is an “Israeli Intelligence Corps unit” of the regime’s military that is responsible for collecting signals intelligence and code decryption.
Zeidenberg is the CEO of Cyber Threat Intelligence (CTI) company, assisting in planning anti-Iran operations by the Israeli regime’s security agencies and spy services, including Mossad, Fars said.
In yet another intelligence defeat for Israel, a hacker group called Moses Staff said on Monday that it had successfully conducted a massive cyber attack against Israel, broken into the servers of major companies and that it was in possession of comprehensive data that could be leaked.
The group announced that it had targeted a number of Israeli firms in its latest attack and acquired a vast trove of critical facilities’ maps, which include information on the location and characteristics of vital systems across the occupied Palestinian territories.
Moses Staff stated that the information it had was of immense significance, amid international sanctions that prevent accurate access to aerial images of critical areas inside the Israeli-occupied Palestinian territories.
The group later released a video showing photos and maps of the Tel Aviv regime’s vital facilities.
Also, on November 3, Moses Staff said it had carried out a cyberattack on three Israeli engineering companies, less than two weeks after it leaked files it said it had obtained in an attack on the Israeli ministry of military affairs.
The group announced at the time that it had targeted Ehud Leviathan Engineering, David Engineers, and HGM Engineering in the attack.
The data leaked from the three companies included projects, maps, contracts, pictures, letters, and videoconferencing images.