Attacks/Breaches

1/4/2019
03:55 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
0%
100%

Data on Hundreds of German Politicians Published Online in Massive Compromise

Authorities are investigating if breach resulted from a leak or a cyberattack.

Private emails, contacts, copies of identity cards, and other personal information belonging to hundreds of German politicians — including Chancellor Angela Merkel — were recently stolen and published on Twitter through the course of December.

The cause of the huge breach is still being investigated. But some media outlets, including Reuters, quoted Germany's Interior Minister Horst Seehofer as saying the data appears to have been illegally obtained by someone using stolen login information for cloud services, email accounts, and social media accounts belonging to the victims.

There is no evidence that the German government's IT systems or networks were compromised, Seehofer said. German investigators are trying to figure out if the breach was the result of a deliberate leak by someone with access to the data or came from a cyberattack, according to Reuters, quoting an unnamed source.

The data that was leaked via Twitter last month included figures from every major political party in Germany except Alternative for Germany (AfD), a far-right-wing party, the BBC reported. The leaked information included Merkel's email address and several emails that she sent and received. Other victims included member of Germany's national parliament, MPs from state parliaments, and a handful of journalists and TV personalities.

The victim profile has led to speculation that some German right-wing groups may have been behind the leak. There is also some suspicion that a Russian advanced threat group, working on behalf of the government, may have been involved, the BBC said.

CrowdStrike, a security vendor that tracks multiple Russian threat groups, says the data currently available suggests the Twitter accounts that were used to post the data were likely managed by the same group of individuals.

 "An analysis of the Twitter follower network used to leak the data indicates that the leak may have a political angle," says Adam Meyers, CrowdStrike's vice president of intelligence. "The motivation behind the leaks remains unclear. With the analysis presently available, CrowdStrike Intelligence cannot rule out an information operation."

On Friday, the Hamburg Commissioner for Data Protection and Freedom of Information noted that the office had asked Twitter to remove access to links pointing to the stolen data but has not heard back from the company. The Twitter account that was used to publish the data has already been shut down. The effort now is try and block links pointing to other platforms where the actual data is located, the Commissioner said in a statement.

"The amount of data published is immense," the Commissioner's office noted. Even though the information that has been leaked has no public safety implication, the potential damage to the affected individuals is significant, it said.

Dave Weinstein, vice president of threat research at Claroty, says that based on the range of information leaked, the breach appears to result from numerous types of account compromises, including email as well as social and financial accounts.

The hackers could have used numerous tactics to compromises these accounts, including spearphising and other forms of social engineering. "It's also possible that these accounts were protected by weak passwords and little to no other authentication controls, which would have made it easier for the attackers to gain access without detection."

Given the victim profile the motivations are very likely political and ideological in nature, Weinstein says. "The absence of right-wing victims suggests that the perpetrator might be a right-wing activity, but it is hardly a conclusive indicator at this point."

The nature of the German data compromise has evoked some comparisons to the 2016 attacks on the Democratic Party networks in the US and the misinformation campaign in the run-up to the presidential election.

"There is a history of Russian state sponsored interference and cyberattacks into western democracies, particularly those aligned with NATO," says Matt Walmsley, EMEA director at Vectra.

Though there's no evidence to support any direct attribution yet, if Russia was the attack, it would not be surprising if threat actors like the Sofacy group (aka Fancy Bear/APT28) were involved. In the past, the group has been linked to attacks on the German parliament, he notes. "Erosion of confidence in the government could benefit nation states wishing to promote political instability in Germany," Walmsley says.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/7/2019 | 1:27:03 PM
As a Jew
I hate to admit it but I am smiling at this one.....
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Now, we come here to play Paw-ke Man Go!"
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...
CVE-2019-6496
PUBLISHED: 2019-01-20
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of...
CVE-2019-3773
PUBLISHED: 2019-01-18
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVE-2019-3774
PUBLISHED: 2019-01-18
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.