Macron condemns 'massive' Hacking Attack

The campaign of French presidential candidate Emmanuel Macron says it has been the target of a "massive hacking attack" after a trove of documents was released online.

The campaign said that genuine files were mixed up with fake ones in order to confuse people. It said it was clear that hackers wanted to undermine Mr Macron ahead of the second round vote.The centrist will face off against far-right candidate Marine Le Pen.

The documents were leaked on a file sharing website late and the Macron camp condemned the action just before the official campaigning period ended at midnight on May 5th.

Candidates and the media now face restrictions until the polls close on Sunday evening, meaning Mr Macron cannot issue further statements. 

Opinion polls had indicated the former economy minister carried a lead of 20 percentage points or more over Ms. Le Pen.

What was released?

About nine gigabytes of data were posted online by an anonymous user.

Mr Macron's En Marche movement said internal campaign documents, including emails and financial data, had been taken in an "act of massive, co-ordinated hacking".
"The leaked files were obtained several weeks ago by hacking personal and professional email accounts of several officials of the movement," it said in a statement. The campaign said the documents showed only legitimate campaign activities.
France's election authorities have warned media outlets against reporting on the contents of the leaked documents because of the restrictions now in place.

Who might be responsible?

That too remains unclear. The Macron camp has not blamed any specific party but said the hack clearly aimed to damage it and undermine French democracy,
It compared it to the leak of Democratic Party emails in last year's US presidential election that was blamed on Russian hackers. Wikileaks, which published those emails, posted a link to the Macron documents on Twitter but implied it was not responsible.

It's not the first time Macron's been targeted. Mr Macron's team has already been the victim of hacking attacks, for which it has blamed groups based in Russia and Ukraine. It suspects the Kremlin of wanting to help Ms. Le Pen, who supports a pro-Moscow foreign policy.

  • Macron campaign servers went down for several minutes in February after attacks apparently originating in Ukraine.
  • Security experts from the company Trend Micro said that Russian hackers were targeting Mr Macron's campaign, using phishing emails, malware and fake net domains in an attempt to grab login names, passwords and other credentials of campaign staff.

Russia has denied that it is behind attacks aimed at Mr Macron.

On May 4th, the centrist candidate filed a lawsuit over online rumours that he had a secret bank account in the Caribbean.
Mr Macron called the allegations "fake news and lies" and said some of the sites spreading them were "linked to Russian interests".

BBC

You Might also Read:

Cyber Attack Concerns Ahead Of French Elections:

French State Hackers Get Ready For Cyber Warfare:

 

« Major Cyber-Attack Prevented
Thieves Drain Protected Bank Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.