Secret Brexit Documents Hacked By Russians

The  personal email account of  the former British international trade minister, Liam Fox, was repeatedly hacked into by Russians who stole classified documents relating to US / UK post-Brexite trade talks. The British government has declined to comment on a Reuters report that these classified US-UK trade documents that were leaked ahead of Britain's 2019 election.

It is alleged that these documents played a role in the election campaign in controversy over the British National Health Service. Government sources have confirmed  that there is an active police investigation into the hack, with likely participation of other security services.

Among the stolen information were six tranches of documents detailing British trade negotiations with the United States, which Reuters first reported last year were leaked and disseminated online by a Russian disinformation campaign. British foreign minister Dominic Raab confirmed that report recently, saying that "Russian actors" had sought to interfere in the election "through the online amplification of illicitly acquired and leaked Government documents".

The UK government claims to have very robust systems in place to protect the IT systems of officials and staff and the possibility that the documents were hacked from Liam Fox's personal email server, echoing the 2016 hack on Hillary Clinton, cannot be discounted. 

The hack of Fox's account - which has not been previously reported - and subsequent leak of the classified documents ahead of last year's election is one of the most direct examples of suspected Russian attempts to meddle in British politics. In the past, Moscow has repeatedly denied allegations of election meddling in Britain, France, the United States and other countries. Russia's foreign ministry described the latest British accusations by Raab as "foggy and contradictory".

After first being posted online by an anonymous internet user in the run-up to last year's vote, the stolen documents were seized on by Britain's opposition Labour Party during the election campaign. It said they showed a government plot to sell the much-loved National Health Service to the United States, an accusation Prime Minister Boris Johnson has repeatedly denied.

In 2017 up to 90 email accounts belonging to peers and MPs, 1% of parliament’s 9,000 email addresses, were hacked by Iranian agents. Later that year it was reported that passwords belonging to 1,000 British MPs and 1,000 Foreign Office staff had been sold by Russian hackers.

Reuters:            Guardian:          Brisbane Times:        Yahoo


You Might Also Read: 

German Government Hit By Russian Hackers:

 

 

« Reducing Exposure To Cyber Attack
China's Surveillance State Extends Beyond Its Borders »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.