British Prime Minister’s Phone Hacked

Russia hacked recent British Prime Minister Liz Truss's phone while she was serving as Foreign Secretary and it was found to be so compromised that it was locked away in a 'secure location' as experts fear top secret negotiations and private messages may have been leaked. 

Truss was forced to change her mobile number shortly before becoming Prime Minister.

The hack was discovered during the summer Conservative party leadership campaign, but the news was suppressed until now on the orders of Boris Johnson, who was Prime Minister at the time and the most senior British civil servant, Cabinet Secretary, Simon Case, for security reasons. 

The Mail on Sunday newspaper described this as amounting to a "news blackout" reporting that agents suspected of working for Russia had been responsible for the alleged hacking, citing unnamed sources.

The spies are believed to have gained access to top-secret exchanges with key international partners as well as private conversations with her leading political allies and experts believe the intercepted messages included conversations with international foreign ministers about the conflict in Ukraine, potentially related to arms shipments.

British government sources insist that it now has "robust" cyber-threat protection in place and newly appointed Levelling Up Secretary, Michael Gove, commented that while he did not know the full details "of what security breach, if any, took place" but said the government took these issues "incredibly seriously". 

These events are just the most recent to emerge over the covert hacking of mobile phones used by political leaders and senior government figures across the European Union and further afield. Canadian experts raised the threat of mobile spyware developed by the NSO Group being used the target the British Prime Minister as long as two years ago.

It is not clear how any hack happened, but opposition parties have seized on the issue. "There are immensely important national security issues raised by an attack like this by a hostile state which will have been taken extremely seriously by our intelligence and security agencies," said Labour party shadow home secretary Yvette Cooper. "There are also serious security questions around why and how this information has been leaked or released right now which must also be urgently investigated."

Sky:     Security Affairs:      Guardian:     Daily Mail:      BBC:     Independent:      

You Might Also Read: 

Mercenary Hacking Group Selling Spyware:

 

« Artificial Intelligence & Its Impact On Cyber Security
Cyber Security Threats For The US Midterm Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

National Security Services Group (NSSG)

National Security Services Group (NSSG)

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

Catalyst Campus For Technology & Innovation

Catalyst Campus For Technology & Innovation

Catalyst Campus is a collaborative ecosystem to create community, spark innovation and stimulate business growth.