On the evening of August 23, the Israeli provider of the “Kosher Internet” Internet Rimon, catering to religious and ultra-orthodox communities, experienced a disruption in its services. The incident was claimed to be the responsibility of the Iranian group Promized Revenge. Customers began reporting issues with connection loss or complete disconnection from the network around 23:30.
In a parallel development, hackers released a video showcasing the shutdown of Rimon’s servers and removal of internal infrastructure in real-time. They claimed to have obtained confidential information from the company’s network, although no evidence of theft has been presented. The drop in traffic at the time of the attack is visible on the schedules of the Rimon IIX, an Israeli Internet exchanger, but there was no complete disconnection. Some customers regained service by morning, but restoration remains inconsistent.
Rimon’s infrastructure operates by intercepting and filtering all Internet traffic through its servers using the MITM method. HTTPS connections are decrypted, checked, unwanted content is blocked, and then traffic is returned to its original form. This setup grants the company access to sensitive user information, including visited sites, page contents, and even personal data. Breaching such a system could expose attackers to passwords, personal information, and filtering settings.
Currently, the official websites of Internet Rimon, as well as subsidiary brands ETROG and Netfiber, are inaccessible. The support service is operating in a limited capacity through an answering machine and social media updates. Despite some progress in communications restoration, the situation is far from being fully stabilized.