Thursday

28th Jul 2016

Unknown hackers stealing EU files for past five years

  • Kaspersky's map of target countries (highlighted in red) (Photo: kaspersky.com)

Russian Internet security firm Kaspersky Lab says unknown hackers have been stealing EU and Nato-encrypted files.

The operation - dubbed "Red October" - claimed victims in embassies, government and military institutions in Austria, Belgium, Bulgaria, the Czech Republic, Cyprus, Finland, France, Germany, Greece, Ireland, Italy, Latvia, Lithuania, Luxembourg, Portugal, Slovakia and Spain.

Dear EUobserver reader

Subscribe now for unrestricted access to EUobserver.

Sign up for 30 days' free trial, no obligation. Full subscription only 15 € / month or 150 € / year.

  1. Unlimited access on desktop and mobile
  2. All premium articles, analysis, commentary and investigations
  3. EUobserver archives

EUobserver is the only independent news media covering EU affairs in Brussels and all 28 member states.

♡ We value your support.

If you already have an account click here to login.

It also hit Australia, Iran, Israel, Russia and the US, among others.

But Belgium, the home of the EU and Nato headquarters, saw 15 separate breaches - the fourth highest number of any country on the list.

Over the past five years, the hackers pulled material, such as files, as well as keystroke history and Internet browsing history, from desktop and laptop computers, servers and USB sticks.

They also stole contact lists, call history and SMS-es from iPhone, Nokia and Windows Mobile smartphones.

In some cases, they hunted for files with extensions "acidcsa, acidsca, aciddsk, acidpvr, acidppr, acidssa," which "appear to refer to the classified software 'Acid Cryptofiler,' which is used by several entities such as the European Union and/or Nato," Kaspersky Lab said in its report.

They even accessed files which had been deleted by users and used malware which quietly resurrects itself after it has been discovered.

The hackers hid behind "proxy" servers in Austria, Germany and Russia.

But Kaspersky Lab's analysis of the malicious code shows traces of Chinese and Russian-speaking authors.

"Currently, there is no evidence linking this with a nation-state-sponsored attack. The information stolen by the attackers is obviously of the highest level and includes geopolitical data which can be used by nation states. Such information could be traded in the underground and sold to the highest bidder, which can be of course, anywhere," it noted.

It added that it began its investigation in October last year following a tip-off from an anonymous "partner."

In an unusual constellation in diplomatic terms, the firm thanked cyber security officials from Belarus, Romania and the US for helping it to nail down details.

Stakeholders' Highlights

  1. Dialogue Platform
  2. GoogleHelping Emergency Services Find You When You Need It Most
  3. Counter BalanceWhat's New in the Investment Plan for Europe: Business as Usual or True Innovation ?
  4. Belgrade Security ForumMigration, Security and Solidarity within Global Disorder: Academic Event 2016
  5. GoogleHow Google Fights Piracy: Creating Value While Fighting Piracy
  6. EJC"My Visit to Israel" - Opinion by MEP Lopez Aguilar, Chair of the EP Working Group on Antisemitism
  7. World VisionChildren Migrating, Out of School and at Work as Hunger Deepens in Southern Africa
  8. European Healthy Lifestyle AllianceStand-Up (and Exercise) to Prevent Chronic Diseases
  9. Centre Maurits CoppietersLaunches a Real-time News Hub Specialised in EU Stakeholders
  10. GoogleEU-US Privacy Shield: Restoring Faith in Data Flows and Transatlantic Relations
  11. World VisionWorld Leaders & Youth Advocates Launch Partnership to End Violence Vs. Children
  12. Counter BalanceReport: Institutionalised Corruption in Romania's Third Largest Company