Bundestag Hack (2015)

From International cyber law: interactive toolkit
Revision as of 22:42, 24 March 2019 by Exeter951 (talk | contribs) (editing real world scenarios)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Date Detected in May 2015
Suspected actor The investigations of the German Authorities indicate that the Russian hacking group 'APT 28' is responsible for the attack. The British Cyber defense agency has alleged that this group is linked to the Russian military secret service 'GRU' which is also accused for meddling with the US Presidential elections in 2016.
Target The network of the German Federal Parliament used by all MPs as well as the German chancellor
Method At the beginning of 2015, MPs received an email from the address 'UN.org' which was designed like a UN News Bulletin. The link contained in the email then lead to the installation of the malware on the computer. The malware was then able to spread and eventually infiltrated the networks of the Parliament.
Purpose The hackers were able to access internal confidential communication data (such as confidential emails of MPs), their schedules, meeting details as well as other sensitive data.
Result The group was able to maintain unauthorized access for several months until the attack was detected in May 2015 and even managed to access a computer in the parliamentary office of the chancellor. Approximately over 20 GB of data was stolen.
Aftermath The German parliament's computer system was shut down for four days for maintenance works and additional safety mechanisms were installed. Investigations initiated by the German intelligence service then lead to the conclusion that the attack was launched by a 'foreign intelligence service'.
Analysed in Scenario 2

real world incident