Russian Hackers Try To Attack German Governing Party.

Konrad-Adenauer-Haus, headquarters of the CDU, in Berlin

A group of hackers known to target critics of the Russian government has been trying since April to attack the computer systems of German Chancellor Angela Merkel's Christian Democratic Union party, a security research firm say. 

Researchers at Trend Micro said the hackers, called Pawn Storm, appear to be trying to steal personal and corporate data from the CDU and high-profile individuals using two free email services. A year ago, the research group linked Pawn Storm to hacking attacks on the Bundestag, the lower house of parliament.

In the latest attempts, the hackers apparently tried to coordinate credential-phishing attacks, using computer services based in Latvia and the Netherlands, to gain access to the systems of the CDU and other high-profile users, Trend Micro said in a blog post.

"Up until now no attacks have taken place," a source at the CDU headquarters in Berlin said. "We have nonetheless made appropriate changes to our IT infrastructure. We can't say anything on the reasons for this."

Pawn Storm has been active for more than a decade and is considered one of the longest-lasting cyber espionage groups.

Several major computer research groups say it has targeted opposition groups in Russia as well as NATO and governments in adjacent Eastern European countries, Turkey and the United States. The military, defense companies and media in those countries have also been attacked, Trend Micro said.

"Pawn Storm clearly targets groups that could be perceived as a risk to Russian politics and interests," Trend Micro said.
The cyber-attack on the German parliament was first reported in May 2015. German media have said replacing the computer system could cost the government millions of euros.

The news magazine Der Spiegel also quoted an internal investigation as saying there were indications that a Russian intelligence agency had staged the attack.
In January 2015, German government websites, including Merkel's website, were hacked in an attack claimed by a group demanding that Berlin end support for the Ukrainian government.

Reuters:

« Think You Know Your Customers? Try Authenticating Them
Anonymous Declares War On Global Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.