German Politicians Suffer Mass Hacking

Just before Christmas the personal and private data, mobile phone numbers and financial information of German politicians including Angela Merkel and President Steinmeier was leaked via Twitter.

This attack included all parts of German politics and also journalists and well-known actors, comedians and artists. This attack seems not be for commercial or financial theft but for political destabilisation and was a focused attack that would have taken the hacker a number of months to achieve and so it certainly was a focused attack.

There are suggestions by Sven Herpig, a German cyber analyst, that because of some of the techniques used that Russia was probably the attacker as they reflected aspects to other Russian attacks, but there is no clear evidence of who is behind the attack which, must have been masterminded over a number of months in order to get such detail information. 

As no information from the far right party the AfD was exposed this suggests that this could have been a political attack rather than from another government, as Germany has four state elections in 2019 and elections at the EU Parliament. 

Now other governments are concerned that they also may have been similarly attacked. Twitter has taken down the account that showed links to the hacked data. However, the tweets are still on-line.

Justice Minister Katarina Barley said it was a "serious attack". "The people behind this want to damage confidence in our democracy and institutions," she said. 

The Berlin government is not sure who or what organisation might have been involved in the attack and some suggest it might have been a lone attacker, although the sheer volume of the information released is shocking and some German politicians believe this about an attempt to destabilise Germany. 

The Interior Minister Seehofer has also said that the preliminary analysis of the attack suggests that the data had been obtained by, "wrongful use of log-in information for cloud services, email accounts or social networks".

News by CSI:

You Might Also Read:

Germany Detects New Russian Cyber-Attack:

 

« Hackers Demand Ransom For Stolen 911 Documents
Major US Newspapers Under Malware Attack »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

NovaTech Automation

NovaTech Automation

NovaTech products and services make the world’s power grids and essential process industries more reliable, efficient, sustainable and secure.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.