BreachExchange mailing list archives

Hackers used "mass resources" to break into EU telecoms system


From: Lee J <lee () riskbasedsecurity com>
Date: Fri, 4 Oct 2013 20:18:58 +1000

http://www.presstv.ir/detail/2013/10/04/327460/hackers-used-mass-resources-to-break-into-eu-telecoms-system/

Top secret leaked documents suggest that the British spying agency GCHQ
managed to break into the Belgacom system. Senior executives from the firm
have told the European Parliament's Electronic Surveillance of EU Citizens
Inquiry that their systems were breached but they don't know by whom.

Media reports have suggested that GCHQ had been monitoring computer and
phone communications at the European Institutions for at least two years.
Belgacom is carrying out an internal probe with the assistance of HP,
Microsoft and FoxIT. The company has also referred the case to Belgian
federal prosecutors.

In response, a Belgacom executive said that a malware virus had been used
to hack into the system but it appeared only to have affected the internal
Belgacom network.

When the inquiry resumes again on Monday it will hear contributions from
the European Data Protection Supervisor and data protection experts from
Germany and France. European Commissioner for Justice Viviane Reding is
also scheduled to address the inquiry next week.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

# OWASP http://www.appsecusa.org
# Builders, Breakers and Defenders
# Time Square, NYC 20-21 Nov
o()xxxx[{::::::::::::::::::::::::::::::::::::::::>

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security offers security intelligence, risk management services and customized security solutions. The 
YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk 
mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.

Current thread: