• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » UK Opens Investigation into Russian Hacking of Government Communications

UK Opens Investigation into Russian Hacking of Government Communications

2019-07-09 by Michelle Dvorak

UK Probes Russia Hackers

British Officials are Investigating Alleged Russian Hacking of Sensitive Diplomatic Communications

UK Suspects Russia Hacked Government Communications. The UK has opened an official investigation probing if Russian hackers are behind the theft of secret British diplomatic communications. The official inquiry into who leaked the cache of sensitive documents initially focused on senior UK politicians and officials but now has turned outward to Russian state-sponsored hackers. Espionage is considered a breach of the UK’s Official Secrets Act and an attempt to destabilize relations.

The hacked memos were written by Sir Kim Darroch, the UK ambassador in Washington. The large cache of stolen and very damaging UK government communications was published by a British journalist, Isabel Oakeshott. She denies that she received them from Russian contacts.

Heimdel Malware Protection
Heimdel Malware Protection

One particularly damaging memo sent by Sir Darroch to senior UK officials painted an unfavorable assessment of US President Donald Trump as his “dysfunctional” White House administration. After the initial investigation into British officials, it is thought that this is an attempt to damage relations between Britain and the United States. The investigation now focuses on Russian hacking attempts who may be motivated to disrupt relations between strong allies.

Britain’s Foreign and Commonwealth Office Permanent Secretary Sir Simon McDonald admitted that “there is clearly significant damage” from the leak and has handed over evidence to police aid in the foreign investigation. He admitted foreign hackers “will be in the scope of the leak inquiry.”

In response to the negative contents of the leaked memos Trump posted on Twitter that the United States will ” no longer deal” with Sir Darroch. The diplomat has been uninvited to an upcoming White House banquet hosted by the White House.

UK Government Hacked by Chinese in 2018

In December 2018 it as discovered that Chinese hackers had compromised the secure communications network of the European Union, known as COREU. Hackers were eavesdropping on sensitive diplomatic communications for several years before the spying was discovered. Cyber security researchers Area 1 discovered the breach and supplied over 1,100 cables were supplied to a news outlet as proof.

The hackers also compromised the communications networks of the United Nations, the American Federation of Labor and Congress of Industrial Organizations (AFL-CIO), ministries of foreign affairs and ministries of finance worldwide, and think tanks in Europe. The sensitive memorandums included conversations with world leaders.

Chinese hackers gained access by IT system belonging to the Ministry of Foreign Affairs of Cyprus. From there they breached COREU where they accessed diplomatic cables relating to a variety of sensitive international matters.

WebRoot cyber sec

Advanced Persistent Threat Groups

Advanced Persistent Threat Groups (APT) are organized hackers who are highly skilled at compromising and stealing from government targets and large corporations. APT hacking groups are commonly state-sponsored and act on behalf of their government. APT groups are assigned numbers as they are discovered. APT28 and APT29 are Russian hacking groups. They are also given pseudonyms by cyber security researchers so as not to offend governments as researchers publish findings of their hacking work.

Russian APT groups are often given names with the word bear in them. APT28 is also called like Fancy Bear. The United State’s government APT group is referred to as the Equation Group.

Filed Under: News Tagged With: APT, Russia

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version