Iran Responsible For Cyber Attack On British Parliament

The cyber-attack on UK Parliament, that compromised MPs’ email accounts, was orchestrated by Iran, according to an unpublished report by British intelligence.

Blackmail fears were raised in June when hackers tried to break into the system used by MPs, peers and staff by searching for weak passwords. Around 90 of the 9,000 email accounts were undermined in the “sustained and determined” attack.

Investigators have traced the source of the attack to the Tehran regime, according to reports. It is thought to be Iran’s first significant act of cyberwarfare against Britain.

The immediate suspicion fell upon foreign governments such as Russia and North Korea, both of which have been accused of coordinating previous hacking attempts. The House of Commons said it did not comment on security matters. A National Cyber Security Centre spokesman said it would be “inappropriate to comment further while enquiries are ongoing”.

Awkward timing

The revelations come as Britain tries to keep the Iran nuclear deal on track after Donald Trump’s refused to back it.

The US president accused Tehran of violating the spirit of the landmark 2015 agreement and believes the international community is being naive in its dealings with the regime.

Mr Trump stopped short of ripping up the deal but said without measures to toughen it up “the agreement will be terminated”.

Theresa May joined Germany’s Angela Merkel and France’s Emmanuel Macron to issue a statement insisting preserving the pact was “in our shared national security interest” and calling for Washington to “consider the implications” of taking action that undermine it.

The statement from the UK, France and Germany said the International Atomic Energy Agency (IAEA) had “repeatedly confirmed” Iran’s compliance to the terms it signed up to. It said: “We, the leaders of France, Germany and the United Kingdom take note of President Trump’s decision not to recertify Iran’s compliance with the Joint Comprehensive Plan of Action (JCPoA) to Congress and are concerned by the possible implications.

“We stand committed to the JCPoA and its full implementation by all sides. Preserving the JCPoA is in our shared national security interest.

“The nuclear deal was the culmination of 13 years of diplomacy and was a major step towards ensuring that Iran’s nuclear programme is not diverted for military purposes.”

Shadow foreign secretary Emily Thornberry accused Mr Trump of an “act of wanton vandalism” and said it was “high time” the Government stopped kowtowing to the US president and challenged him on his actions.

She said: “It is an act of wanton vandalism for Donald Trump to jeopardise the future of that deal today, and to move the goalposts by linking it to important but utterly extraneous issues around Iran’s wider activities in the region.

“It is also totally disingenuous to suggest that the deal just needs to be fixed, when the only evidence that it is any way broken is inside Donald Trump’s head.

“Yet sadly, this kind of reckless and thoughtless behaviour is what we have come to expect from this president.

“From the Paris climate change deal to US membership of Unesco, he has demonstrated a flagrant disregard for the institutions and agreements that bind the international community together in the shared pursuit of a better future.

“That is not what we expect from the President of the United States, and it is high time for the British Government to tell him so.”

iNews:

You Might Also Read:

Iranian Hackers Linked To Malware:

Iran Cyber Attacks on Saudi Arabia:

 

« Microsoft Chief Says N. Korea Was Behind 'WannaCry'
A New IoT Botnet Storm Is Coming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.