Rome: Cyber Spying Rings Security Bells

Mario Draghi, president of the European Central Bank (ECB), and former Italian prime minister Matteo Renzi were among the targets of a cyber-spying operation that sought to hack into e-mail accounts at the ECB and the Bank of Italy, according to two people familiar with the investigation.

Operation "Eye Pyramid" exposed cyber-spying of institutions, state agencies, professionals, political figures and business people lasting for years, say Italian police. It was not clear, though, what information the suspects obtained in their hacking attacks.

Two people were arrested: a nuclear engineer and his sister, both living in Rome and well-known in Roman financial circles.

The suspects tried to obtain confidential and sensitive data, especially on banks, at the ECB in Frankfurt and at the Bank of Italy in Rome, according to another person with information.

The ECB, Renzi’s Democratic Party and the Bank of Italy declined to comment.

The two arrested were suspected of obtaining information on national security, serious illegal access to a computer system and illicit interception of computer communications in an investigation led by Rome prosecutors, the police statement said.

Thanks to a wide network of computers infected with malware called "Eyepyramid", the pair allegedly obtained "confidential information and sensitive data" that was stored on US servers, from a large number of victims "over many years", the police statement said.

Strategic Data

Italian police, working with the cyber division of the Federal Bureau of Investigation (FBI), have seized the servers, it added. An official at the US embassy in Rome declined to comment on behalf of the FBI.

The network targeted individuals who possessed particularly sensitive or strategic data, or "of particular value for those working in specific financial circles", the statement said.

Among those spied on were political figures in an electronic file with the name "Pobu" short for "politician’s business", the Italian police statement added.

Business Live:        Hackers Target France’s Presidential Election:  

Germany's Intelligence Chief Accuses Russia of Cyber Warfare:

 

« Hackers Target France’s Presidential Election
The Swedish Kings of Cyberwar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.