Digital breach targeting the IT systems of the Interior Ministry's technology infrastructure
The German Federal Ministry of the Interior has been hit by a significant cyberattack, according to reports. This targeted operation, which is believed to have originated from China, has been described as a "shocking testimony" to the interior minister's cybersecurity failure by FPÖ security spokesman, Gernot Darmann.
Initial traces suggest that the attack targeted and accessed mail servers of the BMI, affecting approximately 100 of the ministry's 60,000 email accounts. Sensitive content not generally communicated by email was accessed in certain areas. The affected systems were quickly isolated, and external IT security experts were brought in to clean and secure the IT systems.
The operational capability of the police and the essential IT services remain available. Jörg Leichtfried, the responsible state secretary from the SPÖ, confirmed that the attack's pattern matches that of state or semi-state actors. In response, the IT security measures have been further targeted strengthened.
A report has been filed with the public prosecutor's office for unauthorized access to a computer system, and investigations are ongoing. Employees with affected accounts were directly informed by the BMI.
This is not the first time a German government ministry has been targeted by cyberattacks. In early 2020, the foreign ministry was also a target of a severe cyberattack, which took several weeks to resolve.
It's important to note that the Directorate for State Security and Intelligence (DSN) was not impacted by this latest attack. The APA - Austria Presse Agentur eG, Austria's largest national news and press agency, headquartered in Vienna, is not directly involved in this incident.
Darmann also pointed out that the attack was only communicated now, implying a delay in disclosure. This has added to the criticism of the incident as a failure in cybersecurity by the interior minister.
As the investigation continues, the BMI is working diligently to ensure the complete security of its IT systems. The public will be updated as more information becomes available.