Rome: Cyber Spying Rings Security Bells

Mario Draghi, president of the European Central Bank (ECB), and former Italian prime minister Matteo Renzi were among the targets of a cyber-spying operation that sought to hack into e-mail accounts at the ECB and the Bank of Italy, according to two people familiar with the investigation.

Operation "Eye Pyramid" exposed cyber-spying of institutions, state agencies, professionals, political figures and business people lasting for years, say Italian police. It was not clear, though, what information the suspects obtained in their hacking attacks.

Two people were arrested: a nuclear engineer and his sister, both living in Rome and well-known in Roman financial circles.

The suspects tried to obtain confidential and sensitive data, especially on banks, at the ECB in Frankfurt and at the Bank of Italy in Rome, according to another person with information.

The ECB, Renzi’s Democratic Party and the Bank of Italy declined to comment.

The two arrested were suspected of obtaining information on national security, serious illegal access to a computer system and illicit interception of computer communications in an investigation led by Rome prosecutors, the police statement said.

Thanks to a wide network of computers infected with malware called "Eyepyramid", the pair allegedly obtained "confidential information and sensitive data" that was stored on US servers, from a large number of victims "over many years", the police statement said.

Strategic Data

Italian police, working with the cyber division of the Federal Bureau of Investigation (FBI), have seized the servers, it added. An official at the US embassy in Rome declined to comment on behalf of the FBI.

The network targeted individuals who possessed particularly sensitive or strategic data, or "of particular value for those working in specific financial circles", the statement said.

Among those spied on were political figures in an electronic file with the name "Pobu" short for "politician’s business", the Italian police statement added.

Business Live:        Hackers Target France’s Presidential Election:  

Germany's Intelligence Chief Accuses Russia of Cyber Warfare:

 

« Hackers Target France’s Presidential Election
The Swedish Kings of Cyberwar »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.