Russian Hackers Try To Attack German Governing Party.

Konrad-Adenauer-Haus, headquarters of the CDU, in Berlin

A group of hackers known to target critics of the Russian government has been trying since April to attack the computer systems of German Chancellor Angela Merkel's Christian Democratic Union party, a security research firm say. 

Researchers at Trend Micro said the hackers, called Pawn Storm, appear to be trying to steal personal and corporate data from the CDU and high-profile individuals using two free email services. A year ago, the research group linked Pawn Storm to hacking attacks on the Bundestag, the lower house of parliament.

In the latest attempts, the hackers apparently tried to coordinate credential-phishing attacks, using computer services based in Latvia and the Netherlands, to gain access to the systems of the CDU and other high-profile users, Trend Micro said in a blog post.

"Up until now no attacks have taken place," a source at the CDU headquarters in Berlin said. "We have nonetheless made appropriate changes to our IT infrastructure. We can't say anything on the reasons for this."

Pawn Storm has been active for more than a decade and is considered one of the longest-lasting cyber espionage groups.

Several major computer research groups say it has targeted opposition groups in Russia as well as NATO and governments in adjacent Eastern European countries, Turkey and the United States. The military, defense companies and media in those countries have also been attacked, Trend Micro said.

"Pawn Storm clearly targets groups that could be perceived as a risk to Russian politics and interests," Trend Micro said.
The cyber-attack on the German parliament was first reported in May 2015. German media have said replacing the computer system could cost the government millions of euros.

The news magazine Der Spiegel also quoted an internal investigation as saying there were indications that a Russian intelligence agency had staged the attack.
In January 2015, German government websites, including Merkel's website, were hacked in an attack claimed by a group demanding that Berlin end support for the Ukrainian government.

Reuters:

« Think You Know Your Customers? Try Authenticating Them
Anonymous Declares War On Global Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.