British Prime Minister’s Phone Hacked

Russia hacked recent British Prime Minister Liz Truss's phone while she was serving as Foreign Secretary and it was found to be so compromised that it was locked away in a 'secure location' as experts fear top secret negotiations and private messages may have been leaked. 

Truss was forced to change her mobile number shortly before becoming Prime Minister.

The hack was discovered during the summer Conservative party leadership campaign, but the news was suppressed until now on the orders of Boris Johnson, who was Prime Minister at the time and the most senior British civil servant, Cabinet Secretary, Simon Case, for security reasons. 

The Mail on Sunday newspaper described this as amounting to a "news blackout" reporting that agents suspected of working for Russia had been responsible for the alleged hacking, citing unnamed sources.

The spies are believed to have gained access to top-secret exchanges with key international partners as well as private conversations with her leading political allies and experts believe the intercepted messages included conversations with international foreign ministers about the conflict in Ukraine, potentially related to arms shipments.

British government sources insist that it now has "robust" cyber-threat protection in place and newly appointed Levelling Up Secretary, Michael Gove, commented that while he did not know the full details "of what security breach, if any, took place" but said the government took these issues "incredibly seriously". 

These events are just the most recent to emerge over the covert hacking of mobile phones used by political leaders and senior government figures across the European Union and further afield. Canadian experts raised the threat of mobile spyware developed by the NSO Group being used the target the British Prime Minister as long as two years ago.

It is not clear how any hack happened, but opposition parties have seized on the issue. "There are immensely important national security issues raised by an attack like this by a hostile state which will have been taken extremely seriously by our intelligence and security agencies," said Labour party shadow home secretary Yvette Cooper. "There are also serious security questions around why and how this information has been leaked or released right now which must also be urgently investigated."

Sky:     Security Affairs:      Guardian:     Daily Mail:      BBC:     Independent:      

You Might Also Read: 

Mercenary Hacking Group Selling Spyware:

 

« Artificial Intelligence & Its Impact On Cyber Security
Cyber Security Threats For The US Midterm Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.