26th Oct 2016

Unknown hackers stealing EU files for past five years

  • Kaspersky's map of target countries (highlighted in red) (Photo:

Russian Internet security firm Kaspersky Lab says unknown hackers have been stealing EU and Nato-encrypted files.

The operation - dubbed "Red October" - claimed victims in embassies, government and military institutions in Austria, Belgium, Bulgaria, the Czech Republic, Cyprus, Finland, France, Germany, Greece, Ireland, Italy, Latvia, Lithuania, Luxembourg, Portugal, Slovakia and Spain.

Dear EUobserver reader

Subscribe now for unrestricted access to EUobserver.

Sign up for 30 days' free trial, no obligation. Full subscription only 15 € / month or 150 € / year.

  1. Unlimited access on desktop and mobile
  2. All premium articles, analysis, commentary and investigations
  3. EUobserver archives

EUobserver is the only independent news media covering EU affairs in Brussels and all 28 member states.

♡ We value your support.

If you already have an account click here to login.

It also hit Australia, Iran, Israel, Russia and the US, among others.

But Belgium, the home of the EU and Nato headquarters, saw 15 separate breaches - the fourth highest number of any country on the list.

Over the past five years, the hackers pulled material, such as files, as well as keystroke history and Internet browsing history, from desktop and laptop computers, servers and USB sticks.

They also stole contact lists, call history and SMS-es from iPhone, Nokia and Windows Mobile smartphones.

In some cases, they hunted for files with extensions "acidcsa, acidsca, aciddsk, acidpvr, acidppr, acidssa," which "appear to refer to the classified software 'Acid Cryptofiler,' which is used by several entities such as the European Union and/or Nato," Kaspersky Lab said in its report.

They even accessed files which had been deleted by users and used malware which quietly resurrects itself after it has been discovered.

The hackers hid behind "proxy" servers in Austria, Germany and Russia.

But Kaspersky Lab's analysis of the malicious code shows traces of Chinese and Russian-speaking authors.

"Currently, there is no evidence linking this with a nation-state-sponsored attack. The information stolen by the attackers is obviously of the highest level and includes geopolitical data which can be used by nation states. Such information could be traded in the underground and sold to the highest bidder, which can be of course, anywhere," it noted.

It added that it began its investigation in October last year following a tip-off from an anonymous "partner."

In an unusual constellation in diplomatic terms, the firm thanked cyber security officials from Belarus, Romania and the US for helping it to nail down details.

EU myth-busters set for budget upgrade

One year after its launch, East Stratcom, the EU’s “tiny” counter-propaganda cell, has created a 20,000-strong following and could get a €1 million budget.

Stakeholders' Highlights

  1. EU-China ForumDebating the Future of the EU-China Relations on 28 November in Prague
  2. COMECEMigrants: From Fear to Compassion
  3. Birdlife EuropeBusiness as Usual - Juncker Snubs Environment and Protects Broken CAP
  4. EFADraft Bill for a 2nd Scottish Independence Referendum
  5. UNICEFCalls on European Council to Address Plight of Refugee and Migrant Children
  6. ECTAJoin us on 9-10 November in Brussels and Discover the new EU Digital Landscape
  7. Access NowCan you Hear me now? Verizon’s Opportunity to Stand for Global Users
  8. Belgrade Security ForumMeaningful Dialogue Missing Not Only in the Balkans, but Throughout Europe
  9. EuropecheEU Fishing Sector Celebrates Sustainably Sourced Seafood in EU Parliament
  10. World VisionWomen and Girls Urge EU Leadership to Help end Gender-based Violence
  11. Belgrade Security ForumGet the Latest News and Updates on the Belgrade Security Forum @BelSecForum
  12. Crowdsourcing Week EuropeMaster Crowdsourcing, Crowdfunding and Innovation! Conference 21 November - 10% Discount Code CSWEU16