British Prime Minister’s Phone Hacked

Russia hacked recent British Prime Minister Liz Truss's phone while she was serving as Foreign Secretary and it was found to be so compromised that it was locked away in a 'secure location' as experts fear top secret negotiations and private messages may have been leaked. 

Truss was forced to change her mobile number shortly before becoming Prime Minister.

The hack was discovered during the summer Conservative party leadership campaign, but the news was suppressed until now on the orders of Boris Johnson, who was Prime Minister at the time and the most senior British civil servant, Cabinet Secretary, Simon Case, for security reasons. 

The Mail on Sunday newspaper described this as amounting to a "news blackout" reporting that agents suspected of working for Russia had been responsible for the alleged hacking, citing unnamed sources.

The spies are believed to have gained access to top-secret exchanges with key international partners as well as private conversations with her leading political allies and experts believe the intercepted messages included conversations with international foreign ministers about the conflict in Ukraine, potentially related to arms shipments.

British government sources insist that it now has "robust" cyber-threat protection in place and newly appointed Levelling Up Secretary, Michael Gove, commented that while he did not know the full details "of what security breach, if any, took place" but said the government took these issues "incredibly seriously". 

These events are just the most recent to emerge over the covert hacking of mobile phones used by political leaders and senior government figures across the European Union and further afield. Canadian experts raised the threat of mobile spyware developed by the NSO Group being used the target the British Prime Minister as long as two years ago.

It is not clear how any hack happened, but opposition parties have seized on the issue. "There are immensely important national security issues raised by an attack like this by a hostile state which will have been taken extremely seriously by our intelligence and security agencies," said Labour party shadow home secretary Yvette Cooper. "There are also serious security questions around why and how this information has been leaked or released right now which must also be urgently investigated."

Sky:     Security Affairs:      Guardian:     Daily Mail:      BBC:     Independent:      

You Might Also Read: 

Mercenary Hacking Group Selling Spyware:

 

« Artificial Intelligence & Its Impact On Cyber Security
Cyber Security Threats For The US Midterm Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.