German politicians, journalists hit by massive data breach
German politicians, journalists and other prominent personalities are assessing the damage of a large data breach which has seen the publication of gigabytes of private data.
The breach carried on until October but it is not known when it began.
The dataset has been available for download since before Christmas, with details having been shared repeatedly on a Twitter account, @_0rbit (which has now been suspended), in the form of an advent calendar, according to German broadcaster rbb. Despite being publicly available for weeks, the leak only came to light yesterday, rbb correspondent Michael Götschenberg reported.
It is not known why German intelligence did not notice the leak earlier.
According to a report (in German) in Bild magazine, the attack has affected most parliamentary groups apart from the far right Alternative for Germany (AfD) party. Affected parties were notified on Thursday.
Gigabytes of data have been dumped with no attempt to organise it, and details include emails, documents, contact lists for internal party members and even personal communications.
Other material included in the data dump includes copies of ID cards, letters, invoices, direct debit authorisations, chats with family members and personal credit card details.
Those affected include chancellor Angela Merkel and her entire cabinet, German president Frank-Walter Steinmeier and political comedians Jan Böhmermann and Christian Ehring.
Ehring was hit particularly hard with more than 3.4 gigabytes of data published including holiday photos.
Bild said that the Federal Office for the Protection of the Constitution (BfV) began an investigation yesterday and is liaising with foreign intelligence services in an effort to track down the attackers.
However, Germany’s national cyber-security authority, the Federal Office for Information Security (BSI), says the secure government network has not been compromised. Mitigation efforts are being led by the National Cyber Defense Center, the BSI said.
Mike Hart, vice president for central Europe at FireEye, said that the attack was alarming but not surprising. "We already saw what is possible last year when the Bundestag was successfully breached and we’ve also seen high profile politicians hacked in other countries such as President Macron in France and Matteo Salvini in Italy," he said.
Jake Moore, cyber security expert at ESET UK, said the attack was "far more targeted" than usual but should make the targeted politicians aware of the risks and consequences of a breach. "Luckily this stolen data is over a year old but assuming some credit cards are still active, I would suggest they take a few minutes to cancel the cards in question and add fraud protection before the hacking world takes advantage of this breach," he said.
Moore was not surprised that intelligence agencies had not seen the data earlier. "This comes down to how well the Twitter account was publicising it. It is likely that without traction from fellow account holders and strict phrase searching software, the German intelligence would not have heard about it for this length of time. There are billions of accounts and therefore it can sometimes be like searching for a needle in a haystack… and that’s if you know what the needle looks like," he said.
Matt Walmsley, EMEA director at Vectra, said the attack will make a big dent in "the German government’s credibility to secure itself".
"This is just the first of many high-profile breaches we’ll see this year and it serves a powerful reminder that well-resourced, motivated and persistent attackers almost always succeed," said Walmsley.
Kirill Kasavchenko, principal security technologist at NETSCOUT, said the attack will spur governments around the world to fight cyber-crime. "Regardless of the true motivations for this particular attack, all too often it’s still too easy for hackers to access and exploit sensitive information," he said.
Kasavchenko predicted, "That’s why 2019 will be the year western governments devise policy-driven initiatives that put the right security infrastructure in place, and provide government and law enforcement agencies with the means to combat criminal or nation-state cyberattacks."
Industry: Cyber Security News
- IAM developer - Saviynt
- United Kingdom
- Upto £60,000 plus benefits
IAM developer/ Consultant is required for a global consultancy who are looking to expand their deployment team within the UK Looking for a IAM developer who has experience with at least one of the following vendors Saviynt, Clearskye, Beyond Trust or Okta You will be part of a deployment team, involved in a number of high profile projects Key duties will be: implement IAM solutions to ensure secure access to applications, systems, and data for authorized users. This may involve integrating technologies and standards such as SAML, OAuth, LDAP, and RBAC. Conduct IAM audits and assessments: to identify vulnerabilities, gaps, and areas for improvement. Provide IAM support and troubleshooting and resolve incidents related to user access, authentication, and authorization.
- Lead Cyber Security Incident Response Consultant.
- United Kingdom
Seeking skilled and passionate UK-based individual for a Lead Cyber Security Incident Response Consultant opportunity 3 core skillsets for the role Hands on technical incident response (triage and planning). Business consultancy (engaging with clients). Commercial awareness. Being able to engage in business growth conversations. Consultancy experience is an essential as it the ability to visit clients and the office. Additional experience will include, but not be limited to: Developing incident response strategies, guides and procedures for effective incident handling Proactive and reactive defense plans based on cyber threat actors' techniques Offering guidance, supervision, and fostering opportunities for team development Significant career development opportunities for the right individuals.
- OUTSIDE IR35 Contract- Functional tester- SC clearance Microsoft Windows Server
- Outside IR35 contract
Front End Functional tester with SC clearance needed for an Outside IR35 project. Current valid SC clearance is required Experience with functional testing with exchange, sharepoint, SQL and other applications relating across a windows server Migration to 2019. Must be able to get to Central London 3 days a week. Jira, Wiki documentation and automation experience highly desirable.
- ForgeRock Consultant- UK
- United Kingdom
- Upto £100,000 plus benefits
ForgeRock Consultant/ Architect is require for niche consultancy who are looking to expand their presence within the UK/European Market Looking for a lead IAM architect, ideally with ForgeRock experience but would consider other vendors, But looking for someone who is able to advice and consultant with Clients but have the implementation background so they can get involved in projects as and when needed. Key duties will be: Provider IAM consultancy to clients, with a focus on ForgeRock Product stack ·Responsible for the design and implementation of ForgeRock solutions ·Install and configure ForgeRock stack to meet customer authentication and authorization requirements, ·Design and implement OAuth2 protocol using ForgeRock OpenAM, ·Design and develop OpenAM custom authentication modules, ·Configure ForgeRock stack to protect RESTful API, ·Troubleshoot and support ForgeRock IAM stack. This is a great role to join a niche play as they look to kick of their European expansion