German Politicians Suffer Mass Hacking

Just before Christmas the personal and private data, mobile phone numbers and financial information of German politicians including Angela Merkel and President Steinmeier was leaked via Twitter.

This attack included all parts of German politics and also journalists and well-known actors, comedians and artists. This attack seems not be for commercial or financial theft but for political destabilisation and was a focused attack that would have taken the hacker a number of months to achieve and so it certainly was a focused attack.

There are suggestions by Sven Herpig, a German cyber analyst, that because of some of the techniques used that Russia was probably the attacker as they reflected aspects to other Russian attacks, but there is no clear evidence of who is behind the attack which, must have been masterminded over a number of months in order to get such detail information. 

As no information from the far right party the AfD was exposed this suggests that this could have been a political attack rather than from another government, as Germany has four state elections in 2019 and elections at the EU Parliament. 

Now other governments are concerned that they also may have been similarly attacked. Twitter has taken down the account that showed links to the hacked data. However, the tweets are still on-line.

Justice Minister Katarina Barley said it was a "serious attack". "The people behind this want to damage confidence in our democracy and institutions," she said. 

The Berlin government is not sure who or what organisation might have been involved in the attack and some suggest it might have been a lone attacker, although the sheer volume of the information released is shocking and some German politicians believe this about an attempt to destabilise Germany. 

The Interior Minister Seehofer has also said that the preliminary analysis of the attack suggests that the data had been obtained by, "wrongful use of log-in information for cloud services, email accounts or social networks".

News by CSI:

You Might Also Read:

Germany Detects New Russian Cyber-Attack:

 

« Hackers Demand Ransom For Stolen 911 Documents
Major US Newspapers Under Malware Attack »

Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Netgear

Netgear

Netgear provide networking, storage and security solutions including Backup & Disaster Recovery and secure BYOD connectivity.

ViewDS

ViewDS

ViewDS specializes in cloud identity management solutions, directory services, access and authorization management solutions, and data synchronization tools.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

Amida Technology Solutions

Amida Technology Solutions

Amida is an open source software company that focuses on data management and exchange, with specialties in cybersecurity and digital platform strategies.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Sasa Software

Sasa Software

Sasa Software is a leading cyber security provider of extensive content sanitization and deep malware removal solutions.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Cyber Defense by Q

Cyber Defense by Q

Cyber Defense by Q provides specialist consulting services in the areas of Information Security, Technical Security, Security Information and Event Management (SIEM), and Cloud Security.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Cloudpurge

Cloudpurge

Cloudpurge was created to build a platform to protect users against the growing threat of malicious web-based payloads including Malware, Ransomware and Phishing attacks.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.