Macron condemns 'massive' Hacking Attack

The campaign of French presidential candidate Emmanuel Macron says it has been the target of a "massive hacking attack" after a trove of documents was released online.

The campaign said that genuine files were mixed up with fake ones in order to confuse people. It said it was clear that hackers wanted to undermine Mr Macron ahead of the second round vote.The centrist will face off against far-right candidate Marine Le Pen.

The documents were leaked on a file sharing website late and the Macron camp condemned the action just before the official campaigning period ended at midnight on May 5th.

Candidates and the media now face restrictions until the polls close on Sunday evening, meaning Mr Macron cannot issue further statements. 

Opinion polls had indicated the former economy minister carried a lead of 20 percentage points or more over Ms. Le Pen.

What was released?

About nine gigabytes of data were posted online by an anonymous user.

Mr Macron's En Marche movement said internal campaign documents, including emails and financial data, had been taken in an "act of massive, co-ordinated hacking".
"The leaked files were obtained several weeks ago by hacking personal and professional email accounts of several officials of the movement," it said in a statement. The campaign said the documents showed only legitimate campaign activities.
France's election authorities have warned media outlets against reporting on the contents of the leaked documents because of the restrictions now in place.

Who might be responsible?

That too remains unclear. The Macron camp has not blamed any specific party but said the hack clearly aimed to damage it and undermine French democracy,
It compared it to the leak of Democratic Party emails in last year's US presidential election that was blamed on Russian hackers. Wikileaks, which published those emails, posted a link to the Macron documents on Twitter but implied it was not responsible.

It's not the first time Macron's been targeted. Mr Macron's team has already been the victim of hacking attacks, for which it has blamed groups based in Russia and Ukraine. It suspects the Kremlin of wanting to help Ms. Le Pen, who supports a pro-Moscow foreign policy.

  • Macron campaign servers went down for several minutes in February after attacks apparently originating in Ukraine.
  • Security experts from the company Trend Micro said that Russian hackers were targeting Mr Macron's campaign, using phishing emails, malware and fake net domains in an attempt to grab login names, passwords and other credentials of campaign staff.

Russia has denied that it is behind attacks aimed at Mr Macron.

On May 4th, the centrist candidate filed a lawsuit over online rumours that he had a secret bank account in the Caribbean.
Mr Macron called the allegations "fake news and lies" and said some of the sites spreading them were "linked to Russian interests".

BBC

You Might also Read:

Cyber Attack Concerns Ahead Of French Elections:

French State Hackers Get Ready For Cyber Warfare:

 

« Major Cyber-Attack Prevented
Thieves Drain Protected Bank Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.