iTnews

Cyber attacks target European Commission

By Tom Brewster on Mar 25, 2011 12:11PM
Cyber attacks target European Commission

Ahead of important summit.

The European Commission (EC) has confirmed it was targeted by a cyber attack ahead of a significant summit in Brussels.

An EC spokesperson told IT PRO it had detected attacks targeting the EC as well as the External Action Service, which effectively acts as the EU's foreign ministry.

Despite reports indicating the attacks were serious, the spokesman claimed they had not caused any serious impact on operations.

The spokesman said the threat was not "necessarily related" to the summit, which takes place this week and will focus on a number of critical situations, including the Libyan crisis.

Employees had been asked to change their login passwords to the EC network, whilst email was temporarily shut down as officials investigated the attacks.

The spokesman would not give any further details on the nature of the threats.

The news comes just weeks after the French Ministry was attacked, in which more than 150 computers were compromised.

Some sources have indicated the tactics used in both cases were similar.

Mikko Hypponen, chief research officer at F-Secure, said it was "highly likely" the two attacks came from the same source.

Despite this, Hypponen was dismissive of relating the attacks to cyber warfare.

"Cyber attacks, certainly. But I don't see a war," he told IT PRO.

"Espionage has always been happening, during times of war and peace. Nowadays it's obviously done with computers, as the information is no longer on paper - it's data."

As claimed by various security experts, the whole concept of cyber war has been over-hyped.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © ITPro, Dennis Publishing
Tags:
attackscommissioncybereuropeansecuritytarget

Partner Content

Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies
Vast majority of surveyed firms still rely on password authentication
Promoted Content Vast majority of surveyed firms still rely on password authentication
How a 'micro data centre' enables your business, your way
Promoted Content How a 'micro data centre' enables your business, your way
Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Tom Brewster
Mar 25 2011
12:11PM
0 Comments

Related Articles

  • Gov pledges to mandate IoT cyber security standards
  • NSW Planning dept finds CISO at Tabcorp
  • TfNSW hit by second cyber attack in less than 18 months
  • SA gov to create bug bounty program
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.