British Prime Minister’s Phone Hacked

Russia hacked recent British Prime Minister Liz Truss's phone while she was serving as Foreign Secretary and it was found to be so compromised that it was locked away in a 'secure location' as experts fear top secret negotiations and private messages may have been leaked. 

Truss was forced to change her mobile number shortly before becoming Prime Minister.

The hack was discovered during the summer Conservative party leadership campaign, but the news was suppressed until now on the orders of Boris Johnson, who was Prime Minister at the time and the most senior British civil servant, Cabinet Secretary, Simon Case, for security reasons. 

The Mail on Sunday newspaper described this as amounting to a "news blackout" reporting that agents suspected of working for Russia had been responsible for the alleged hacking, citing unnamed sources.

The spies are believed to have gained access to top-secret exchanges with key international partners as well as private conversations with her leading political allies and experts believe the intercepted messages included conversations with international foreign ministers about the conflict in Ukraine, potentially related to arms shipments.

British government sources insist that it now has "robust" cyber-threat protection in place and newly appointed Levelling Up Secretary, Michael Gove, commented that while he did not know the full details "of what security breach, if any, took place" but said the government took these issues "incredibly seriously". 

These events are just the most recent to emerge over the covert hacking of mobile phones used by political leaders and senior government figures across the European Union and further afield. Canadian experts raised the threat of mobile spyware developed by the NSO Group being used the target the British Prime Minister as long as two years ago.

It is not clear how any hack happened, but opposition parties have seized on the issue. "There are immensely important national security issues raised by an attack like this by a hostile state which will have been taken extremely seriously by our intelligence and security agencies," said Labour party shadow home secretary Yvette Cooper. "There are also serious security questions around why and how this information has been leaked or released right now which must also be urgently investigated."

Sky:     Security Affairs:      Guardian:     Daily Mail:      BBC:     Independent:      

You Might Also Read: 

Mercenary Hacking Group Selling Spyware:

 

« Artificial Intelligence & Its Impact On Cyber Security
Cyber Security Threats For The US Midterm Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

Telspace Systems

Telspace Systems

Telspace Systems provides penetration testing, vulnerability assessment and training services.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Astroscreen

Astroscreen

Astroscreen is an early warning system for detecting disinformation and information warfare on social media.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

SpecTrust

SpecTrust

SpecTrust provides an all-in-one defense solution for identity abuse & fraud, enabling your company's talent to stay focused on the core business.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Noerr

Noerr

Noerr is one of the top European law firms with 500 professionals in Germany, Europe and the USA. We provide solutions to complex and sophisticated legal matters including cyber risks.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.