Italy's Foreign Ministry under Cyber Attack

Italy's foreign ministry was hacked last year, a source close to the department said recently, confirming a report in the Guardian newspaper which also said Russia was suspected of perpetrating the attack.

Last spring, hackers got into the system at the ministry, which was then headed, by the now Prime Minister, Paolo Gentiloni. These attacks carried on for more than four months but did not gain access to classified information, the paper said.

"The Italian government had already informed the paper of what it is reporting today," the source said in response to the article, noting that security had since been stepped up.

"These were not attacks on the encrypted computer system which carries the most important and sensitive information, but the email system for staff at the foreign ministry and embassies," the source, said.

Gentiloni, who took over as premier in December 2016, was not affected by the attack, the Guardian quoted a government official as saying. He avoided using email when he was serving as foreign minister, the paper said.

According to the Guardian, two people with knowledge of the attack said the Russian state was believed to have been behind it. The source close to the ministry could not confirm this.

Cyber-crime has come into sharp focus since United States intelligence agencies accused Russia of interfering in last year's US election.

The Russian foreign ministry did not immediately respond to a request for comment on the report. The Kremlin has described allegations of Russian interference in the US election as "fabricated" and "a witch hunt".

An Italian government source told Reuters this year that the foreign ministry had been hacked in the past and that Rome suspected the perpetrators were Russian, but that it is impossible to say with certainty where such attacks came from.

Recently in January 2017, an Italian brother and sister were arrested on suspicion of hacking into the emails of European Central Bank President Mario Draghi and thousands of others. The police chief who conducted the investigation said there was no evidence they had acted on behalf of foreign states.

Reuters:

 

« Wikipedia's editors cut out the Daily Mail
Hamas Upgrades Cyber Espionage Capability »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain accelerator is located in Washington D.C. which is one of the world's top cybersecurity ecosystems.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

Blockaid

Blockaid

Blockaid is the onchain security platform for monitoring, detecting, and responding to onchain and offchain threats.