Germany May Go Offensive After Russian Cyber Attacks

The head of the German equivalent of the FBI said he'd like the legal authority to "wipe out" servers the Russian government allegedly used to deploy cyber-attacks again Germany.

"We believe it is necessary that we are in a position to be able to wipe out these servers if the providers and the owners of the servers are not ready to ensure that they are not used to carry out attacks," Hans-Georg Maassen, Head of Germany's BfV internal security agency (pictured) said recently at a cyber conference in Potsdam, Germany. He was talking about the Kremlin.

Russian hackers grabbed a big chunk of data on the Bundestag, Germany's parliament, in an attack that happened two years ago this month. They've also gone after the Christian Democratic Union, the party of Chancellor Angela Merkel, and individual politicians in the lead up to the nation's September elections, though it's not known whether those attacks were successful.

The accusations are familiar. The United States government has been adamant that Russia hacked Democratic party officials in the lead up to the 2016 presidential election. The information found in the hacks was released throughout election season, in what appeared to be attempts to damage Hillary Clinton's candidacy in favor of Donald Trump.

The French government, too, has accused the Kremlin of spreading misinformation in favor of its preferred French presidential candidate, the far-right Marine Le Pen.

Germany's national elections are up in September, and Maassen said he's not sure whether the Kremlin will use the information he says they stole.

The German government is reportedly looking into reworking a few laws to allow German cyber squads to find the stolen information and eradicate it.

Ein News
 

You Might Also Read:

German Spy Chief Fears Russian Interference In  2017 Elections:

Russian Hackers Try To Attack German Governing Party:

Merkel Bugged While Pondering Greece Crisis:

 

 

« Global C4ISR Has A Cyber Warfare Surge
Threat Intelligence Starter Resources »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

Cybercrime Investigation & Coordinating Center (CICC) - Philippines

Cybercrime Investigation & Coordinating Center (CICC) - Philippines

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Hicomply

Hicomply

Hicomply simplifies compliance management with smart, user-friendly tools, helping you scale your processes and stay in control - no matter how complex.

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.