First of all, a big thank you to the _secpro community when they voted on its Top 10 APTs. Of course, the top two have been the most controversial ones that were included. Needless to say, these topics needed a careful look at by the editor! This week, we look at Unit 8200, an Israeli unit in the IDF.

As a disclaimer: most organisations do not consider Unit 8200 to be an APT. For that reason, its inclusion on this list is controversial. However, due to certain tactics used by Unit 8200, they may be considered amongst APTs.
What is Unit 8200?
Unit 8200 is the largest unit in the Israeli Defense Forces (IDF) responsible for signals intelligence (SIGINT), cyber operations, and code decryption. The unit was established in 1952, and its primary mission is to gather intelligence on Israel’s enemies, both in the region and worldwide. Over the years, Unit 8200 has been involved in a wide range of intelligence and cyber operations, both offensive and defensive.
One of the most well-known cyber operations associated with Unit 8200 is the development of Stuxnet, a sophisticated computer worm that targeted industrial control systems used in Iran’s nuclear program. Stuxnet was designed to infiltrate Iran’s uranium enrichment facility and disrupt the country’s nuclear program by causing damage to the centrifuges used to enrich uranium.
How did Unit 8200 use Stuxnet?
Stuxnet was ground-breaking in its use of several advanced techniques, including exploiting previously unknown vulnerabilities in Microsoft Windows and programmable logic controllers (PLCs). It was also the first known example of a cyber weapon that caused physical damage to a target. The Stuxnet attack was a significant blow to Iran’s nuclear program and set back the country’s progress towards developing nuclear weapons by several years.
Since the Stuxnet attack, there have been several other high-profile cyberattacks attributed to Unit 8200, although the Israeli government has not confirmed these reports. For example, it has been reported that Unit 8200 was involved in the development of the Flame malware, a highly sophisticated cyber weapon that was used to gather intelligence from targets in Iran, Syria, and other countries in the Middle East.
There have also been reports that Unit 8200 has been involved in other cyber attacks against Israel’s enemies, including the development of the Duqu malware and the discovery of a vulnerability in WhatsApp that was used to target human rights activists and journalists.
Other instances of Unit 8200 allegedly launching malware include:
- Flame
- Gauss
- Regin
Is Unit 8200 an APT… really?
It is worth noting that the Israeli government has been generally tight-lipped about the activities of Unit 8200 and other intelligence agencies. However, it is widely believed that the unit plays a critical role in Israel’s national security and that it has been involved in a wide range of intelligence and cyber operations over the years.
Despite the successes of Stuxnet and other cyber operations, there are also concerns about the potential risks associated with cyber weapons. Cyber attacks can be difficult to attribute, and the use of cyber weapons could potentially escalate into physical conflict. The Stuxnet attack was a significant milestone in the history of cyber warfare, and it has raised important questions about the role of cyber weapons in modern conflict.
For a deep dive into the malware used by Unit 8200, consult the list below: