Article Details

Scrape Timestamp (UTC): 2023-10-04 20:25:04.069

Source: https://www.theregister.com/2023/10/04/nato_data_attack/

Original Article Text

Click to Toggle View

'Gay furry hackers' brag of second NATO break-in, steal and leak more data. 'No impact on missions,' military powerhouse insists. NATO is "actively addressing" multiple IT security incidents after a hacktivist group claimed it once again breached some of the military alliance's websites, this time stealing what's claimed to be more than 3,000 files and 9GB of data. When asked about this alleged intrusion, a NATO official declined to answer specific questions and told The Register: NATO is facing persistent cyber threats and takes cyber security seriously. NATO cyber experts are actively addressing incidents affecting some unclassified NATO websites. Additional cyber security measures have been put in place. There has been no impact on NATO missions, operations and military deployments. On Sunday, the SiegedSec crew claimed it broke into six NATO web portals: the alliance's Joint Advanced Distributed Learning e-learning website; the NATO Lessons Learned Portal, from which the gang said it stole 331 documents; the Logistics Network Portal (588 documents and other files); the Communities of Interest Cooperation Portal; the NATO Investment Division Portal (207 documents); and the NATO Standardization Office (2,116 documents). The hacktivists, which describe themselves as made up of "gay furry hackers," usually target government orgs whose policies they disagrees with, and have a flare for political publicity stunts, also posted a link to the purported stolen files on their Telegram channel. "The astonishing siegedsec hackers have struck NATO once more!!1!!!," the crew wrote, bragging: "NATO: 0. Siegedsec: 2." The team is referring to its earlier NATO intrusion in July, during which it claimed it swiped information belonging to 31 nations and leaked 845MB of data from the alliance's the Communities of Interest (COI) Cooperation Portal. This site is used by NATO organizations and member states, though it doesn't contain classified information. And yes, it's one of the portals that SiegedSec says it breached again at the end of September. Threat intel biz CloudSEK has analyzed the leaked data dumped in the earlier breach and said it contained at least 20 unclassified documents and 8,000 personnel records with names, companies and units, working groups, job titles, business email addresses, home addresses, and photos. In other words: almost everything a spy, would-be identity thief, doxxer, social-engineering campaign coordinator, or plain old troll would like for potential fraud, phishing, espionage, or more general havoc.  We would be remiss not to point out that October is cybersecurity awareness month, and it appears that even after 20 years of this annual event, there's still much awareness to be gained.

Daily Brief Summary

CYBERCRIME // NATO Faces Second Cybersecurity Breach by 'SiegedSec' Hacktivist Group

Cybersecurity events targeted at NATO are being "actively addressed" after claims by a hacktivist group of a repeated security breach on several of the military alliance's websites. The group alleges to have stolen more than 3,000 files and around 9GB of data.

The hackers, known as the 'SiegedSec' crew, claim to have infiltrated six NATO web portals, boasting of their success on their Telegram channel with the message, "NATO: 0. Siegedsec: 2."

The group had previously breached NATO's security in July, taking data from 31 countries and leaking approximately 845MB from the NATO Communities of Interest (COI) Cooperation Portal.

Threat intelligence company CloudSEK analysed data from the first breach, confirming it contained 20 unclassified documents and 8,000 personal records including names, job titles, business and home addresses, and photographs.

These breaches give potential identity thieves, spies, or trolls access to information useful for fraud, phishing, and general chaos. Despite additional security measures in place, NATO confirms ongoing cyber threats but insists there has been no impact on its missions or operations.