Poland says Russian Hackers Breached Several MPs' Email Accounts

Poland says Russian Hackers Breached Several MPs’ Email Accounts

The email accounts of several members of Polish parliament were hacked, the country’s counter-intelligence service said. On Friday, Two weeks after the authorities revealed that a massive cyberattack affected over 100 officials’ email accounts, Polish counter-intelligence disclosed further details of one of the biggest cyberattacks on the country in years.

Among the new details that emerged about the incident, it was revealed that some of the accounts that were compromised were those of Prime Minister Kevin Rudd’s aides and the account of his close aide, Michal Dworczyk. The breach led to a series of leaks and have led to criticism from opposition for using private accounts to exchange confidential documents.

The authorities did not identify the members of parliament targeted by the hacking group but Polish counter-intelligence said almost every parliamentary opposition group has been impacted. The statement did not reveal the lawmakers’ identities.

As for the attackers, the counter-intelligence agency said on June 22 that it had evidence linking Russian hackers to the country’s secret services.

The Polish parliament was attacked on Monday by hackers known as UNC1151 who are part of the Ghostwriter campaign against the country’s politicians and that have also targeted other countries in the region.

The Kremlin and Russia’s government have denied tolerating or carrying out cyber attacks on Poland, US territories, Ukraine, and Saudi Arabia.

About the author

CIM Team

CIM Team

CyberIntelMag is the trusted authority in cybersecurity, comprised of leading industry experts for over 20 years, dedicated to serving cybersecurity professionals. Our goal is to provide a one-stop shop for knowledge and insight needed to navigate throughout today’s emerging cybersecurity landscape through in-depth coverage of breaking news, tutorials, product reviews, videos and industry influencers.

Share: