United Nations hit by possible state-sponsored attack

At least 40 servers were compromised over three separate European offices, according to a leaked report

Hackers managed to infiltrate a slew of servers at three separate United Nation offices last year in what is reported as apparent espionage action. 

The extent of the hack, along with the identity of the perpetrators are unknown, and the attack itself has only just come to light thanks to a leaked document reported by The New Humanitarian

Advertisement - Article continues below

At least 40 servers at UN offices in Vienna, Geneva and the UN Office of the High Commissioner for Human rights - also located in Geneva - were compromised, according to the leaked document dated 20 September 2019. 

The UN suffered a "major meltdown", an unnamed UN official told TNH, and "Multiple workshops and assessments have been conducted to verify that the exploited vulnerabilities have been mitigated."

The cyber attack was so "sophisticated" that it was possibly the work of a state-backed actor, another official told the Associated Press

"It's as if someone were walking in the sand, and swept up their tracks with a broom afterward," the official said. "There's not even a trace of a cleanup."

The attack began in the middle of July last year and was first reported by an IT official working at the Geneva office on 30 August: "We are working under the assumption that the entire domain is compromised. The attacker doesn't show signs of activity so far, we assume they established their position and are dormant."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

It also included systems for the UN's human rights and human resources departments and breached some administrator accounts. The affected system included core infrastructure where user and management passwords, system controls and security firewalls were stored. Despite not being told what had happened, staff were asked to change their passwords.

Related Resource

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

"The attack resulted in a compromise of core infrastructure components," said UN spokesperson Stéphane Dujarric, according to TNH. "As the exact nature and scope of the incident could not be determined, [the UN offices in Geneva and Vienna] decided not to publicly disclose the breach."

The UN has diplomatic status and is therefore immune from the legal process, so there is no regulation enforcing it to disclose breaches of data. 

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/phishing/355936/inky-announces-20m-series-b-funding-round
phishing

INKY announces $20M Series B funding round

4 Jun 2020
Visit/security/ransomware/355909/microsoft-issues-warning-about-new-ponyfinal-ransomware-attacks
ransomware

Microsoft issues warning about new PonyFinal ransomware attacks

3 Jun 2020
Visit/security/data-breaches/355908/amtrak-guest-reward-suffers-a-data-breach
data breaches

Amtrak Guest Reward suffers a data breach

3 Jun 2020
Visit/security/cyber-security/355903/brand-impersonation-and-form-based-attacks-are-rising
cyber security

Brand-impersonation and form-based attacks are rising

3 Jun 2020

Most Popular

Visit/operating-systems/ios/355935/apple-confirms-serious-bugs-in-ios-135
iOS

Apple confirms serious bugs in iOS 13.5

4 Jun 2020
Visit/security/ransomware/355945/new-ransomware-uses-java-to-target-software-organisations
ransomware

Tycoon ransomware discovered using Java image files to target software firms

5 Jun 2020
Visit/hardware/355904/picking-the-perfect-multifunction-printer
Hardware

Picking the perfect multifunction printer

4 Jun 2020