Israel Launches Cybersecurity Hotline for Suspected Hacking

The center is the first such emergency response line in the world and aims to help businesses and individuals

Lavy Shtokhamer, director of Israel's Computer Emergency Response Centre (CERT) at a cyber hotline facility in Beersheba, southern Israel February 14, 2019.
Amir Cohen/Reuters

Israel has launched a cyber hotline, staffed mostly by veterans of military computing units, to enable businesses and private individuals to report suspected hacking and receive real-time solutions.

The 119 call-in number to the Computer Emergency Response Center is being billed by Israel and cybersecurity experts as a world first.

To really understand Israel and the Middle East - subscribe to Haaretz

“Our job is to mitigate the damage as quickly as possible, to learn about the threats and to spread the knowledge where relevant,” CERT Director Lavy Shtokhamer told Reuters at the facility in the southern high-tech hub city of Beersheba.

“A cyberattack may not be limited only to property or financial damage. It can also threaten lives.”

In some cases, Shtokhamer said, CERT will dispatch teams of experts to affected computer users at a few hours’ notice.

At the center, 20 responder terminals face a bank of huge screens. One shows a map of the world, with cyberattacks rendered as meteor-like strikes on Israel and the country of origin of computer servers used by the hackers.

When Reuters viewed the facility, these were in the northeastern United States, Western Europe and Indonesia — details that Shtokhamer played down, given hackers’ use of proxy servers to mask their true locations.

He declined to elaborate on this. Ahead of Israel’s April 9 general election, its officials have been reticent about the possibility of online influence campaigns of the kind Russia has been accused of waging in the West, or about Chinese cyber-espionage.

Israeli hacking expertise is also widely believed to have been used in sabotage against Iran’s nuclear program and controversial surveillance software made available to foreign clients.

Since its launch three weeks ago, the hotline has received around 100 calls daily, Shtokhamer said.

Most complainants, he said, have been victims of cybercriminals rather than nation-states, and less than one percent were hoax reports.

Around 15% of callers have been so-called white-hat hackers, sleuths who find vulnerabilities in corporate or government systems and want them plugged before they can be hit.

CERT also runs a chat room that links up the technology officers of Israel’s major firms for candid but discreet information-sharing about data breaches.

Michael Levi, a Cardiff University criminology professor who has advised European Union and United Nations agencies on cybersecurity, described the Israeli hotline as unique and said it could catch on elsewhere.

“The keys are good advice and no leaks, and using patterns to build up good threat assessments and rapid responses,” he said. “The earlier you get reports the more you can prevent.”