00:25This is a major breach,
00:28and one that strikes at the heart of Israel's most sensitive institutions.
00:33A hacker group now claims it has infiltrated Israel's Holocaust Memorial database
00:38and exposed what it says are undercover intelligence operatives.
00:43The group, calling itself Hendalah, announced it had hacked into the Yad Vashem,
00:48one of Israel's most symbolic and secure institutions.
00:52According to their statement, they now possess personal data of all visitors,
00:57including financial donors, foreign delegations, and, most explosively,
01:03alleged agents linked to Israel's intelligence agency, Mossad.
01:07The claim that some operatives visited the site using false identities
01:12and that those identities have now been exposed.
01:15If true, this would represent a serious intelligence breach,
01:19not just a cyberattack but a potential compromise of covert networks.
01:24The group says this operation is part of a broader campaign,
01:28targeting what it calls Israel's fragile cybersecurity and its intelligence infrastructure.
01:34This is not their first claim.
01:37Earlier this month, the same group said it had accessed the personal phone of Hertzi Halevi,
01:42releasing images, videos, and confidential documents,
01:45including footage from private offices and overseas visits.
01:49In another case, they claim to have breached communications linked to a senior Mossad figure,
01:54releasing thousands of sensitive files,
01:57a pattern of attacks focused not just on systems but on individuals.
02:03Supporters of the group are calling these operations a form of information warfare,
02:07a way to challenge Israel's intelligence dominance without conventional weapons.
02:11But there are also serious questions.
02:14Because so far, these claims have not been independently verified,
02:18and Israel has not publicly confirmed any breach at Yad Vashem.
02:22Cybersecurity experts caution that in modern conflict, information itself becomes a weapon.
02:28Claims can be amplified, data can be selective,
02:31and narratives can shape perception as much as facts.
02:35Still, the implications are significant.
02:37Because if even part of this is true,
02:40it raises concerns about the security of sensitive institutions,
02:43and the exposure of covert identities.
02:45This also highlights a growing battlefield,
02:48not in the air or on the ground, but in cyberspace,
02:52where hackers can target symbols, systems, and intelligence networks,
02:56from anywhere in the world.
02:58The lines between cyberwarfare and real-world conflict
03:00are becoming increasingly blurred.
03:03Is this a real breach of intelligence networks,
03:05or another front in the war of narratives?
03:08Because in this conflict, information itself has become a weapon.
03:32Itr's not being described as a weaponess.
03:32It has been some symbols to the official area.
Comments