British Prime Minister’s Phone Hacked

Russia hacked recent British Prime Minister Liz Truss's phone while she was serving as Foreign Secretary and it was found to be so compromised that it was locked away in a 'secure location' as experts fear top secret negotiations and private messages may have been leaked. 

Truss was forced to change her mobile number shortly before becoming Prime Minister.

The hack was discovered during the summer Conservative party leadership campaign, but the news was suppressed until now on the orders of Boris Johnson, who was Prime Minister at the time and the most senior British civil servant, Cabinet Secretary, Simon Case, for security reasons. 

The Mail on Sunday newspaper described this as amounting to a "news blackout" reporting that agents suspected of working for Russia had been responsible for the alleged hacking, citing unnamed sources.

The spies are believed to have gained access to top-secret exchanges with key international partners as well as private conversations with her leading political allies and experts believe the intercepted messages included conversations with international foreign ministers about the conflict in Ukraine, potentially related to arms shipments.

British government sources insist that it now has "robust" cyber-threat protection in place and newly appointed Levelling Up Secretary, Michael Gove, commented that while he did not know the full details "of what security breach, if any, took place" but said the government took these issues "incredibly seriously". 

These events are just the most recent to emerge over the covert hacking of mobile phones used by political leaders and senior government figures across the European Union and further afield. Canadian experts raised the threat of mobile spyware developed by the NSO Group being used the target the British Prime Minister as long as two years ago.

It is not clear how any hack happened, but opposition parties have seized on the issue. "There are immensely important national security issues raised by an attack like this by a hostile state which will have been taken extremely seriously by our intelligence and security agencies," said Labour party shadow home secretary Yvette Cooper. "There are also serious security questions around why and how this information has been leaked or released right now which must also be urgently investigated."

Sky:     Security Affairs:      Guardian:     Daily Mail:      BBC:     Independent:      

You Might Also Read: 

Mercenary Hacking Group Selling Spyware:

 

« Artificial Intelligence & Its Impact On Cyber Security
Cyber Security Threats For The US Midterm Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.