Germany data breach: Teenager quizzed by police after house raid

The 19-year-old is considered a witness and claims to know the hacker known as 'Orbit'

A teenager is being questioned by German police over his possible involvement in the massive data breach that led to data belonging to the country's politicians and celebrities being leaked online.

The 19-year-old, known only as Jan S, is being held after a raid on a house in Heilbronn in south-west Germany, in which police were said to have removed an unspecified quantity of computer equipment and the contents of rubbish bins, according to the Guardian.

Germany's state broadcaster, ARD, reported that the teenager was questioned "for several hours" as a potential witness. Jan S has denied he was behind the hack, but has claimed to know the real identity of the hacker "Orbit", who claimed responsibility on social media.

The leaked data, which was first published over the Christmas period but only discovered last week, is said to contain personal phone numbers, correspondence, credit card details belonging to hundreds of political figures, including Chancellor Angela Merkel, and internal documents belonging to Germany's political parties.

This was eventually leaked across Twitter in a style similar to an advent calendar, with fresh information being revealed each day.

So far it's unclear where the data was originally sourced from, but the incident is believed to be the biggest data breach in German history.

Jan S is said to be employed within the IT industry and claims to have been in contact with Orbit for some years through an encrypted messaging service, but that account has since been deleted.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Global ransom DDoS extortionists are retargeting companies
distributed denial of service (DDOS)

Global ransom DDoS extortionists are retargeting companies

22 Jan 2021
BEC scammers are using Google Forms to identify easy victims
phishing

BEC scammers are using Google Forms to identify easy victims

21 Jan 2021
FBI warns of ongoing corporate vishing attacks
phishing

FBI warns of ongoing corporate vishing attacks

19 Jan 2021
Hackers using COVID vaccine as a lure to spread malware
hacking

Hackers using COVID vaccine as a lure to spread malware

15 Jan 2021

Most Popular

School laptops sent by government arrive loaded with malware
malware

School laptops sent by government arrive loaded with malware

21 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021