Since Wednesday we officially know that attackers have procured sichZugang to particularly secure Government network IVBB – Information Network Berlin-Bonn. Although Russian offenders are speculated, officially this is not yet. How long exactly DieAngreifer UnentdecktZugang had on Ministry records and communication is also unclear. So we would do well not to panic.
if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile8’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile8’; elem.className = “ad ad-desktop ad-desktop–8 ad-desktop–8-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-8’).parentNode.appendChild(elem); AdController.render(‘iqadtile8’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 8 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile3’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile3’; elem.className = “ad ad-mobile ad-mobile–3 ad-mobile–3-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-3’).parentNode.appendChild(elem); AdController.render(‘iqadtile3’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 3 mobile’) } } }
The stolen or MitgelesenenDokumenten are eir unclassified, open information. Or those that are marked with lowest level of classified information-only for DenDienstgebrauch. Of course, it also contains important information, but not most explosive. There are nochdrei furr levels of confidentiality. However, documents of se classification levels are located in a separate network, which is better secured and – as far as we know – has not yet been compromised.
Sven Herpig is responsible for area of international cyber security policy at Thinktank Stiftung new responsibility in Berlin. Previously, he was employed by Federal Office for Security in Information technology, among ors. © Sebastian Heise
Espionage is, it is said, second oldest trade expedite. It is naïve to expect that espionage would not also be in age of Digitalisierungdurchsetzen. In fact, this year we celebrate DAS30 anniversary of Cyberspionage. 1998, AmerikanischeVerteidigungsministerium was probably first target of a feindlichenCyberoperation known today under name Moonlight Maze. Auchdamals was wrongly speaking of war. Even n Russians were supposed to have been.
The espionage has changed
Of course re is a difference between Cyberspionage vondamals and today. 1998 re were fewer security mechanisms, but also wenigerfähige attackers. The biggest difference, however, is that Dassunsere entire communication and file record is now digital. One könntealso think that an attacker has access to a true treasure as soon as he is in system. This is probably not entirely wrong, but is more like famous search for needle imhaystack. Or needle in needle pile. In a public authority, as well as everywhere else, an incredible number of documents are generated that do not offer any added value for a Angreiferüberhaupt – especially if it manufactured translated as well.
if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-desktop ad-desktop–4 ad-desktop–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-mobile ad-mobile–4 ad-mobile–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 mobile’) } } }
In meantime, however, re is no longer only politischeCyberspionage. Shortly after 1998, digital economic espionage was added. In addition to Governments, companies and ir secrets were also goal of cyber attacks. Because this information can sometimes make a lot of money. 2009 The spectrum n expanded to HandfesteSabotage, when a sophisticated malware, called Stuxnet, was used against dieUrananreicherungsanlage in Natanz to undermine IranischeAtomprogramm.
Finally, we also had to see that Cyberangriffegegen democratic processes such as US election are being used. This all draws a gloomy picture. However, it also shows that straight ErfolgteAngriff on German government network ranks among less critical. Let us remember: Bundestag election of 2017 was, as far as we know, ohnedigitale incidents.
Nothing should be glossed over. The attack weighs heavily, einegezielte operation against German government network violates GeltendesRecht and requires a strong reaction. But some experts undAbgeordnete to take word “war” in ir mouths is exaggerated. Therefore, don’t panic, so far it’s just espionage.