German politicians, journalists hit by massive data breach
German politicians, journalists and other prominent personalities are assessing the damage of a large data breach which has seen the publication of gigabytes of private data.
The breach carried on until October but it is not known when it began.
The dataset has been available for download since before Christmas, with details having been shared repeatedly on a Twitter account, @_0rbit (which has now been suspended), in the form of an advent calendar, according to German broadcaster rbb. Despite being publicly available for weeks, the leak only came to light yesterday, rbb correspondent Michael Götschenberg reported.
It is not known why German intelligence did not notice the leak earlier.
According to a report (in German) in Bild magazine, the attack has affected most parliamentary groups apart from the far right Alternative for Germany (AfD) party. Affected parties were notified on Thursday.
Gigabytes of data have been dumped with no attempt to organise it, and details include emails, documents, contact lists for internal party members and even personal communications.
Other material included in the data dump includes copies of ID cards, letters, invoices, direct debit authorisations, chats with family members and personal credit card details.
Those affected include chancellor Angela Merkel and her entire cabinet, German president Frank-Walter Steinmeier and political comedians Jan Böhmermann and Christian Ehring.
Ehring was hit particularly hard with more than 3.4 gigabytes of data published including holiday photos.
Bild said that the Federal Office for the Protection of the Constitution (BfV) began an investigation yesterday and is liaising with foreign intelligence services in an effort to track down the attackers.
However, Germany’s national cyber-security authority, the Federal Office for Information Security (BSI), says the secure government network has not been compromised. Mitigation efforts are being led by the National Cyber Defense Center, the BSI said.
Mike Hart, vice president for central Europe at FireEye, said that the attack was alarming but not surprising. "We already saw what is possible last year when the Bundestag was successfully breached and we’ve also seen high profile politicians hacked in other countries such as President Macron in France and Matteo Salvini in Italy," he said.
Jake Moore, cyber security expert at ESET UK, said the attack was "far more targeted" than usual but should make the targeted politicians aware of the risks and consequences of a breach. "Luckily this stolen data is over a year old but assuming some credit cards are still active, I would suggest they take a few minutes to cancel the cards in question and add fraud protection before the hacking world takes advantage of this breach," he said.
Moore was not surprised that intelligence agencies had not seen the data earlier. "This comes down to how well the Twitter account was publicising it. It is likely that without traction from fellow account holders and strict phrase searching software, the German intelligence would not have heard about it for this length of time. There are billions of accounts and therefore it can sometimes be like searching for a needle in a haystack… and that’s if you know what the needle looks like," he said.
Matt Walmsley, EMEA director at Vectra, said the attack will make a big dent in "the German government’s credibility to secure itself".
"This is just the first of many high-profile breaches we’ll see this year and it serves a powerful reminder that well-resourced, motivated and persistent attackers almost always succeed," said Walmsley.
Kirill Kasavchenko, principal security technologist at NETSCOUT, said the attack will spur governments around the world to fight cyber-crime. "Regardless of the true motivations for this particular attack, all too often it’s still too easy for hackers to access and exploit sensitive information," he said.
Kasavchenko predicted, "That’s why 2019 will be the year western governments devise policy-driven initiatives that put the right security infrastructure in place, and provide government and law enforcement agencies with the means to combat criminal or nation-state cyberattacks."
Industry: Cyber Security News
- Cloud Channel Manager
- Up to £75,000 Base dependant on experience + Double OTE
A Cloud Channel Manager is needed for a Leading Cloud Service Provider in London due to increased customer demand. The Cloud Channel Manager will be primarily responsible for rebuilding & protecting current accounts and also new logo sales into the channel e.g. Value Added Resellers (VAR) / Managed Service Providers (MSP), SI etc. Requirements Current experience selling Cloud technology such as AWS / Azure into the channel Over achieved on sales targets. Long tenure (3/4 years+) in current and previous positions. Reference Number: PG7419
- Business Development Manager (Public Sector)
- Up to £75,000 Basic + Double OTE (Commission is uncapped and subject to accelerators)
One of our clients who are a leading service provider in London are looking for a Public Sector focussed Business Development Manager. The Business Development Manager (Public Sector) will be selling from a portfolio of managed ICT services and cloud services to prospects within the public sector focusing on central government, healthcare, university’s The portfolio will cover flexible end to-end managed services, UC, cloud, hosting and SDWan. Preference will also be given to Business Development Manager (Public Sector) who satisfy the following criteria: Over achievement of new business sales targets 5 years of experience in selling at least two of these; managed services, UC, Azure, AWS, SDWAN etc. New Business Background is a must in central government, healthcare or universities In return you will be working for a company that is growing over 25% organically year on year with excellent sales support and a great senior leadership team. Reference Number: BD7410
- Google Cloud Architect
- Up to £90.000 base plus bonus
We have a very urgent requirement for Google Cloud Architect for one of the reputed clients who are a fast growing GCP partner. The Google Cloud Architect will leverage Google Cloud technologies, designs, develops, and manages robust, secure, scalable, highly available, and dynamic solutions to drive business objectives. This will require all dimensions of cloud architecture including: Building, migrating and testing GCP environments and integration with other providers Build, design and implement scalable cloud-based web applications for PaaS, IaaS or SaaS. Provide thought leadership for cloud developer technology and collaborate with cross-functional engineering teams to streamline or improve adoption of Google Cloud Platform. This position will be located in London, United Kingdom. Unfortunately our client are unable to sponsor for this opportunity Reference Number: ES7411
- Solutions Consultant (Telecoms, SDWAN, IOT, WAN, Hosted services)
- Up to €90,000 plus car, bonus and benefits
Solutions Consultant is required to help lead a number of key client Migrations projects for this tier 1 Telecom company, the main role for the Solutions Consultant is helping customers migrate to new services, with a focusing on hosting (AWS, Azure) SDWAN and IOT You will be responsible for Post sales design documentation, implementation and migration of complex solutions for managed enterprise customers. Complex solutions consist of multi-product services. The TDA’s role is to ensure that these services interoperate and integrate into the customer environment. Such products consist of but not limited to MPLS, Ethernet, IPSec VPN’s, VoIP, Video Conferencing, Wireless, Internet, Private DSL, WAN Optimization, Managed Security Services, Managed Hosting, SDWAN and Complex Migration Planning. The TDA will own the technical delivery of customer solutions and will be the technical interface between the customer, product teams and project management during service delivery. Close engagement with pre-sales, technically validating solutions proposed are deliverable and all technical aspects are clearly defined prior to contract signature. The TDA accepts technical ownership of the solution at the point of contract signature. Lead customer facing technical workshops requiring excellent communication with the ability to articulate technical concepts clearly to all levels of competency. Providing support to 3rd line teams for OEM and design related faults. You will need to be at CCIE level (ideally CCIE R&S or SP ) with strong low level design and deployment skills, comfortable in front of customers and leading customer meeting Knowledge in SDWAN and Hosted services would be advantageous Reference Number: RA7413