Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    EU Commission Disables Remote Email Access After Massive Malware Attack

    By
    Fahmida Y. Rashid
    -
    March 25, 2011
    Share
    Facebook
    Twitter
    Linkedin

      The European Commission has disabled all remote email access following a serious and targeted attack days before a summit to discuss Libya.

      A large-scale malware-driven attack on the European Commission and its foreign ministry European External Action Service was discovered on March 22. Employees have been asked to change their passwords and all remote access to email and internal intranet have been revoked, the commission said.

      “We’re often hit by cyber-attacks, but this is a big one,” an EC source told BBC News.

      The Security Directorate, the EC’s security team, was investigating the breach, according to Antony Gravili, inter-institutional relations spokesman for the Commission. The team will also be focusing on how to avoid similar attacks in the future. The EEAS will be using its intelligence capabilities to minimize the effects of the breach, as well.

      Gravili blamed the breach on malware and not on a direct assault to steal documents. “In reality it’s very difficult to draw the line between those two eventualities,” countered Rik Ferguson, director or security research and communication at Trend Micro, in a blog post. “Malware is simply one of the tools in the criminal and international espionage bag of tricks,” he said.

      The EC still did not know how long the attack had been on-going or the type of malware used, Gravili said. He also declined to reveal whether hackers had launched the attack via email or whether any data had been compromised.

      The breach was discovered just days before the summit that opened March 24 to discuss the Libyan crisis, European debt and nuclear power. However, Gravili downplayed the timing of the attacks. “I have no information at all linking the attack to the summit, we don’t only suffer attacks at these times,” he said.

      The breach is similar to the sophisticated hack that stole G20 documents from the French Ministry of Finance earlier this year. In that attack, more than 150 computers were compromised and the attackers were after files on the G20 summit held in Paris in February. The attackers were professional, determined and persistent, and had launched “the first attack of this size and scale against the French state,” Patrick Pailloux, director general of the French National Agency for IT Security, said at the time.

      Gravili said no evidence had been found yet to link these two incidents. While Gravili refused to speculate on the attackers’ origin, a different EU source suggested to EUObserver that China may be among the suspects.

      Also earlier this month, nearly 40 government and commercial Web sites in South Korea were hit by a massive malware-driven denial-of-service attack. The attack affected the president’s office, the Foreign Ministry, National Intelligence Service and sites belonging to the United States military in Korea.

      The malware, NetBot infected computers and then configured them as zombies the joined into the large-scale denial-of-service attacks, according to Ron Meyran, director of security products at Radware.

      Along with launching a DDOS attack, the malware also destroyed the master boot records of the infected zombies, according to an analysis of the attack by Georg Wicherski, a security researcher at McAfee.

      Ferguson called the attacks on government organizations the “new reality” and that cyber-espionage is easier to initiate and carries less risk than traditional espionage, Ferguson said. It is also much more difficult to spot, he said.

      Fahmida Y. Rashid

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×