Germany May Go Offensive After Russian Cyber Attacks

The head of the German equivalent of the FBI said he'd like the legal authority to "wipe out" servers the Russian government allegedly used to deploy cyber-attacks again Germany.

"We believe it is necessary that we are in a position to be able to wipe out these servers if the providers and the owners of the servers are not ready to ensure that they are not used to carry out attacks," Hans-Georg Maassen, Head of Germany's BfV internal security agency (pictured) said recently at a cyber conference in Potsdam, Germany. He was talking about the Kremlin.

Russian hackers grabbed a big chunk of data on the Bundestag, Germany's parliament, in an attack that happened two years ago this month. They've also gone after the Christian Democratic Union, the party of Chancellor Angela Merkel, and individual politicians in the lead up to the nation's September elections, though it's not known whether those attacks were successful.

The accusations are familiar. The United States government has been adamant that Russia hacked Democratic party officials in the lead up to the 2016 presidential election. The information found in the hacks was released throughout election season, in what appeared to be attempts to damage Hillary Clinton's candidacy in favor of Donald Trump.

The French government, too, has accused the Kremlin of spreading misinformation in favor of its preferred French presidential candidate, the far-right Marine Le Pen.

Germany's national elections are up in September, and Maassen said he's not sure whether the Kremlin will use the information he says they stole.

The German government is reportedly looking into reworking a few laws to allow German cyber squads to find the stolen information and eradicate it.

Ein News
 

You Might Also Read:

German Spy Chief Fears Russian Interference In  2017 Elections:

Russian Hackers Try To Attack German Governing Party:

Merkel Bugged While Pondering Greece Crisis:

 

 

« Global C4ISR Has A Cyber Warfare Surge
Threat Intelligence Starter Resources »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

Cyabra

Cyabra

Cyabra is leading the fight against disinformation. Our AI shields companies and the public sector by uncovering malicious actors, bot networks, and GenAI content.