By Michalis Michael
The aim was the Cyprus Post Offices and the electronic mail accounts
Hour by hour, more and more information is spread according to which hackers have gained access to the government, electronic mail accounts, known as “gov.cy”, emails.
According to what’s known, researchers at the Cisco’s Talos Security Department have revealed that a group of hackers called “Sea Turtle” carried out a broad piracy campaign in the DNS countries, hitting 40 different organizations, including Cyprus.
According to an article of the “wired” website, their aim was to collect information from government agencies, foreign ministries, secret services, military targets and energy related groups in the Middle East and North Africa.
What experts say
According to previously published information, there were repeated attempts by hackers in order to access the electronic accounts of European diplomats via Cyprus. This information reported that such attempts are being made around the world, with officials of the Cypriot Foreign Ministry stressing that there was no cause for concern.
Now the situation is different as it seems that the hackers have gained the access they wanted. The revelation of what has happened was made by Internet Specialist, Dinos Pastos when he posted a publication on Facebook, right after the issue took large dimensions. “Perhaps it was the biggest hacking so far of which the Cyprus Government Electronic Mail Service, inter alia, was victim (all services that have .gov.cy as email)”, he said, giving the magnitude of the attack that has taken place.
The way of action
And while the case is still open for comments on the Cypriot side, the question is the level of security in this cyberwar that is constantly at the center of the services of the Republic of Cyprus. The issue of the attacks has also been discussed at EU level in the past and on the basis of the abovementioned information on the hacking attack to the European diplomatic correspondence.
The way hackers struck this time resembles the one of December 2018 when, according to published information, they had placed malicious software, which recorded and sent all the communications that were taking place to specific IPs.
The computer user is unable to understand whether what is requested by the windows that are opened is legal or not and he continues his work normally while the software is retrieving passwords and accessing data.
According to what is now revealed by Cisco’s Talos security group, Cyprus, Albania, Armenia, Egypt, Iraq, Jordan, Lebanon, Syria, Turkey and the United Arab Emirates were also victims of the “Sea Turtle” attack./ibna