German politicians, journalists hit by massive data breach
German politicians, journalists and other prominent personalities are assessing the damage of a large data breach which has seen the publication of gigabytes of private data.
The breach carried on until October but it is not known when it began.
The dataset has been available for download since before Christmas, with details having been shared repeatedly on a Twitter account, @_0rbit (which has now been suspended), in the form of an advent calendar, according to German broadcaster rbb. Despite being publicly available for weeks, the leak only came to light yesterday, rbb correspondent Michael Götschenberg reported.
It is not known why German intelligence did not notice the leak earlier.
According to a report (in German) in Bild magazine, the attack has affected most parliamentary groups apart from the far right Alternative for Germany (AfD) party. Affected parties were notified on Thursday.
Gigabytes of data have been dumped with no attempt to organise it, and details include emails, documents, contact lists for internal party members and even personal communications.
Other material included in the data dump includes copies of ID cards, letters, invoices, direct debit authorisations, chats with family members and personal credit card details.
Those affected include chancellor Angela Merkel and her entire cabinet, German president Frank-Walter Steinmeier and political comedians Jan Böhmermann and Christian Ehring.
Ehring was hit particularly hard with more than 3.4 gigabytes of data published including holiday photos.
Bild said that the Federal Office for the Protection of the Constitution (BfV) began an investigation yesterday and is liaising with foreign intelligence services in an effort to track down the attackers.
However, Germany’s national cyber-security authority, the Federal Office for Information Security (BSI), says the secure government network has not been compromised. Mitigation efforts are being led by the National Cyber Defense Center, the BSI said.
Mike Hart, vice president for central Europe at FireEye, said that the attack was alarming but not surprising. "We already saw what is possible last year when the Bundestag was successfully breached and we’ve also seen high profile politicians hacked in other countries such as President Macron in France and Matteo Salvini in Italy," he said.
Jake Moore, cyber security expert at ESET UK, said the attack was "far more targeted" than usual but should make the targeted politicians aware of the risks and consequences of a breach. "Luckily this stolen data is over a year old but assuming some credit cards are still active, I would suggest they take a few minutes to cancel the cards in question and add fraud protection before the hacking world takes advantage of this breach," he said.
Moore was not surprised that intelligence agencies had not seen the data earlier. "This comes down to how well the Twitter account was publicising it. It is likely that without traction from fellow account holders and strict phrase searching software, the German intelligence would not have heard about it for this length of time. There are billions of accounts and therefore it can sometimes be like searching for a needle in a haystack… and that’s if you know what the needle looks like," he said.
Matt Walmsley, EMEA director at Vectra, said the attack will make a big dent in "the German government’s credibility to secure itself".
"This is just the first of many high-profile breaches we’ll see this year and it serves a powerful reminder that well-resourced, motivated and persistent attackers almost always succeed," said Walmsley.
Kirill Kasavchenko, principal security technologist at NETSCOUT, said the attack will spur governments around the world to fight cyber-crime. "Regardless of the true motivations for this particular attack, all too often it’s still too easy for hackers to access and exploit sensitive information," he said.
Kasavchenko predicted, "That’s why 2019 will be the year western governments devise policy-driven initiatives that put the right security infrastructure in place, and provide government and law enforcement agencies with the means to combat criminal or nation-state cyberattacks."
Industry: Cyber Security News
- Data Protection Officer (DPO)/ Risk Manager
- 65000 plus benefits
Data Protection Officer with a strong focus on risk management is needed for this expanding Paytech business. You will work closely with the CISO to help understand how the data is being processed within the business and identify the business risk associated with this. this role will be both internally and externally focused As the business processes payments across the globe, they require someone with knowledge of the different data regulations, GPPR, CCPA. This role is focused on helping to identify potential business risks associated with the data usage and ensuring that issues are flagged to the relevant teams within the business.
- Security Monitoring and Vulnerability Analyst, End User. PCI Level 1 Service Provider.
CH7843 Security Monitoring and Vulnerability Analyst, End User. Level 1 Service Provider. £50,000 London Security Monitoring and Vulnerability Analyst needed to join an Level 1 Service Provider. The Security Analyst will be responsible monitoring, configuring, fine tuning and generally improving the security tool capability. Specific experience with Tripwire Log Center and Tripwire Enterprise is highly desirable. Other security tools experience should include the managing and monitoring of firewalls, Anti Phishing, AV, vulnerability management, IAM etc. Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. Hands on penetration testing is a very nice to have. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-clone
- Internal Security Auditor, Level 1 Service Provider (ISO27001)
- Upto 65,000 plus benefits
Internal Security Auditor ISO 27001, PCI, needed to join a Cyber team within this expanding Fintech business. The Internal Security Auditor will have end to end responsibility for planning, delivering, remediating any findings etc. Experience working within financial services is highly desirable. This Is a great time to join a newly formed and growing Cyber team within a rapidly expanding fintech, that is taking a major share of its market. We are looking for someone with experience, (but not to be limited to) a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling etc. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection.
- DevOps Engineer with IdAM
- Upto £80,000 plus benefits
We are ooking for an DevOps engineer, idealy with IdAM (identity access Management) experience, this is a senior role for someone that can be the lead hands on person on a project. Your role will be to work on the deployment project implementing the solution into the exsiting application so will be used to connect an applications into mulipe 3rd party appliactions. We Would look at someone who has done DevOps with Security and can cross train into IdaM, but preference would be given to someone with the IdAM experience this is a great opportunity to join a consultancy that work on some truely amazing and differnet solutions