Iran Responsible For Cyber Attack On British Parliament

The cyber-attack on UK Parliament, that compromised MPs’ email accounts, was orchestrated by Iran, according to an unpublished report by British intelligence.

Blackmail fears were raised in June when hackers tried to break into the system used by MPs, peers and staff by searching for weak passwords. Around 90 of the 9,000 email accounts were undermined in the “sustained and determined” attack.

Investigators have traced the source of the attack to the Tehran regime, according to reports. It is thought to be Iran’s first significant act of cyberwarfare against Britain.

The immediate suspicion fell upon foreign governments such as Russia and North Korea, both of which have been accused of coordinating previous hacking attempts. The House of Commons said it did not comment on security matters. A National Cyber Security Centre spokesman said it would be “inappropriate to comment further while enquiries are ongoing”.

Awkward timing

The revelations come as Britain tries to keep the Iran nuclear deal on track after Donald Trump’s refused to back it.

The US president accused Tehran of violating the spirit of the landmark 2015 agreement and believes the international community is being naive in its dealings with the regime.

Mr Trump stopped short of ripping up the deal but said without measures to toughen it up “the agreement will be terminated”.

Theresa May joined Germany’s Angela Merkel and France’s Emmanuel Macron to issue a statement insisting preserving the pact was “in our shared national security interest” and calling for Washington to “consider the implications” of taking action that undermine it.

The statement from the UK, France and Germany said the International Atomic Energy Agency (IAEA) had “repeatedly confirmed” Iran’s compliance to the terms it signed up to. It said: “We, the leaders of France, Germany and the United Kingdom take note of President Trump’s decision not to recertify Iran’s compliance with the Joint Comprehensive Plan of Action (JCPoA) to Congress and are concerned by the possible implications.

“We stand committed to the JCPoA and its full implementation by all sides. Preserving the JCPoA is in our shared national security interest.

“The nuclear deal was the culmination of 13 years of diplomacy and was a major step towards ensuring that Iran’s nuclear programme is not diverted for military purposes.”

Shadow foreign secretary Emily Thornberry accused Mr Trump of an “act of wanton vandalism” and said it was “high time” the Government stopped kowtowing to the US president and challenged him on his actions.

She said: “It is an act of wanton vandalism for Donald Trump to jeopardise the future of that deal today, and to move the goalposts by linking it to important but utterly extraneous issues around Iran’s wider activities in the region.

“It is also totally disingenuous to suggest that the deal just needs to be fixed, when the only evidence that it is any way broken is inside Donald Trump’s head.

“Yet sadly, this kind of reckless and thoughtless behaviour is what we have come to expect from this president.

“From the Paris climate change deal to US membership of Unesco, he has demonstrated a flagrant disregard for the institutions and agreements that bind the international community together in the shared pursuit of a better future.

“That is not what we expect from the President of the United States, and it is high time for the British Government to tell him so.”

iNews:

You Might Also Read:

Iranian Hackers Linked To Malware:

Iran Cyber Attacks on Saudi Arabia:

 

« Microsoft Chief Says N. Korea Was Behind 'WannaCry'
A New IoT Botnet Storm Is Coming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DomainTools

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.