Hacker broke into most famous email service using Encryption
A group of hackers claimed that they hacked into email service ProtonMail and stole “significant” amounts of data. They have not yet released data about hacking, but put forward their demands to the company to repurchase the stolen information.
It is unknown whether the hacker alone or in a team of cyber criminals, however, in their statement said that they managed to steal “significant” amounts of company data which passed through the postal service. The user, who published the text with this information, also accused ProtonMail to send the decrypted user data on American servers.
“We offer to return the data ProtonMail for a small fee. If they refuse, we will publish or sell the data of users around the world”, — noted in the text.
Also in the text there are several claims to the security service. “Open source ProtonMail can be freely checked on Github, and everyone can see that they have not set a mandatory function of SRI; this allows you to rig and collect user data at any time”. The hacker added that the data collection in this case will be invisible to the server, because without the inclusion of SRI, all users should check the site code during the execution of the task.
They also accused that ProtonMail sends the decrypted user data on American servers. The hackers suggested that it may be associated with the Swiss Treaty on mutual legal assistance MLAT. “It was surprising to note, while not directly concerns the fact of hacking,” reads the text.
Hacking ProtonMail denies and says that they have no evidence that hackers have access to information about users. While in the service confirmed that they know about a limited number of compromised accounts that were compromised after you enter the credentials from phishing attacks. In the service believe that it is not a systemic problem.
“The criminals trying to extort money from ProtonMail, claiming that we are violating the confidentiality of the data, but they have no evidence. An internal investigation revealed two messages from criminals who again repeated the accusations, but we have no signs of violations,” added the company. They promised to seriously consider them if they have reliable information about the burglary.
source sivweek
Industry: Cyber Security News

Latest Jobs
-
- Threat and Vulnerability Analyst / Penetration Tester. London
- London
- 55000
-
Threat and Vulnerability Analyst / Penetration tester needed. Threat and Vulnerability Analyst needed. Immediate opportunity. Must be able to commute to London min 2 days a week. The individual will join a highly technical team that is responsible for identifying vulnerabilities and threat in various applications / coding with a view of driving remediation and change. This is a critical role. The ability to achieve SC clearance is a must. A deeply technical Linux Redhat background with, penetration testing / code review / threat detection background is essential. Looking to hire immediately. Apply today for more information.
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Head of Penetration Testing, UK based, Flexible location.
- United Kingdom
- Upto £100,000 plus excellent benefits
-
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.