Germany May Go Offensive After Russian Cyber Attacks

The head of the German equivalent of the FBI said he'd like the legal authority to "wipe out" servers the Russian government allegedly used to deploy cyber-attacks again Germany.

"We believe it is necessary that we are in a position to be able to wipe out these servers if the providers and the owners of the servers are not ready to ensure that they are not used to carry out attacks," Hans-Georg Maassen, Head of Germany's BfV internal security agency (pictured) said recently at a cyber conference in Potsdam, Germany. He was talking about the Kremlin.

Russian hackers grabbed a big chunk of data on the Bundestag, Germany's parliament, in an attack that happened two years ago this month. They've also gone after the Christian Democratic Union, the party of Chancellor Angela Merkel, and individual politicians in the lead up to the nation's September elections, though it's not known whether those attacks were successful.

The accusations are familiar. The United States government has been adamant that Russia hacked Democratic party officials in the lead up to the 2016 presidential election. The information found in the hacks was released throughout election season, in what appeared to be attempts to damage Hillary Clinton's candidacy in favor of Donald Trump.

The French government, too, has accused the Kremlin of spreading misinformation in favor of its preferred French presidential candidate, the far-right Marine Le Pen.

Germany's national elections are up in September, and Maassen said he's not sure whether the Kremlin will use the information he says they stole.

The German government is reportedly looking into reworking a few laws to allow German cyber squads to find the stolen information and eradicate it.

Ein News
 

You Might Also Read:

German Spy Chief Fears Russian Interference In  2017 Elections:

Russian Hackers Try To Attack German Governing Party:

Merkel Bugged While Pondering Greece Crisis:

 

 

« Global C4ISR Has A Cyber Warfare Surge
Threat Intelligence Starter Resources »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Copenhagen FinTech

Copenhagen FinTech

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

Pantherun Technologies

Pantherun Technologies

Pantherun is a pioneering force in the realm of encryption technology and data protection solutions.

Raven

Raven

Raven are on a mission to help companies protect their cloud native applications by focusing on runtime.