Macron condemns 'massive' Hacking Attack

The campaign of French presidential candidate Emmanuel Macron says it has been the target of a "massive hacking attack" after a trove of documents was released online.

The campaign said that genuine files were mixed up with fake ones in order to confuse people. It said it was clear that hackers wanted to undermine Mr Macron ahead of the second round vote.The centrist will face off against far-right candidate Marine Le Pen.

The documents were leaked on a file sharing website late and the Macron camp condemned the action just before the official campaigning period ended at midnight on May 5th.

Candidates and the media now face restrictions until the polls close on Sunday evening, meaning Mr Macron cannot issue further statements. 

Opinion polls had indicated the former economy minister carried a lead of 20 percentage points or more over Ms. Le Pen.

What was released?

About nine gigabytes of data were posted online by an anonymous user.

Mr Macron's En Marche movement said internal campaign documents, including emails and financial data, had been taken in an "act of massive, co-ordinated hacking".
"The leaked files were obtained several weeks ago by hacking personal and professional email accounts of several officials of the movement," it said in a statement. The campaign said the documents showed only legitimate campaign activities.
France's election authorities have warned media outlets against reporting on the contents of the leaked documents because of the restrictions now in place.

Who might be responsible?

That too remains unclear. The Macron camp has not blamed any specific party but said the hack clearly aimed to damage it and undermine French democracy,
It compared it to the leak of Democratic Party emails in last year's US presidential election that was blamed on Russian hackers. Wikileaks, which published those emails, posted a link to the Macron documents on Twitter but implied it was not responsible.

It's not the first time Macron's been targeted. Mr Macron's team has already been the victim of hacking attacks, for which it has blamed groups based in Russia and Ukraine. It suspects the Kremlin of wanting to help Ms. Le Pen, who supports a pro-Moscow foreign policy.

  • Macron campaign servers went down for several minutes in February after attacks apparently originating in Ukraine.
  • Security experts from the company Trend Micro said that Russian hackers were targeting Mr Macron's campaign, using phishing emails, malware and fake net domains in an attempt to grab login names, passwords and other credentials of campaign staff.

Russia has denied that it is behind attacks aimed at Mr Macron.

On May 4th, the centrist candidate filed a lawsuit over online rumours that he had a secret bank account in the Caribbean.
Mr Macron called the allegations "fake news and lies" and said some of the sites spreading them were "linked to Russian interests".

BBC

You Might also Read:

Cyber Attack Concerns Ahead Of French Elections:

French State Hackers Get Ready For Cyber Warfare:

 

« Major Cyber-Attack Prevented
Thieves Drain Protected Bank Accounts »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Vantor

Vantor

Vantor is a Managed Security Services Provider (MSSP) that specializes in providing outsourced, managed cybersecurity services.