Skip to main content

20-Year-Old Man Arrested For Carrying Out Germany's Biggest Data Leak

20-Year-Old Man Arrested For Carrying Out Germany's Biggest Data Leak

germany data leak
German federal police have arrested a 20-year-old local student for stealing and publishing a massive trove of personal data of hundreds of politicians, journalists and other public figures last month.

The young man, whose identity has not been revealed by the police, was arrested after police raided his parent's house in west-central German State of Hesse on Sunday and recovered a computer that the suspect tried to destroy 2 days before the search and a data backup.

The suspect, who believed to have acted alone, has admitted of carrying out the mass hacking of German politicians out of anger at their political statements, BKA Federal Criminal Police revealed.
"The accused was interrogated on 07.01.2019 by the senior prosecutor and officials of the Federal Criminal Police Office. He comprehensively acknowledged the allegations against him and provided information on his own offenses," the BKA said in a press release.
"Due to a lack of grounds for detention, the accused was released in the evening hours of 07.01.2019 and the provisional arrest canceled. The evidence seized as part of the search warrant, in particular computers and data carriers, is currently being fully evaluated."
Despite not being a computer expert, the man managed to access and leak personal data from about 1,000 people, including Chancellor Merkel, journalists, and politicians from parties currently represented in the federal parliament, including the CDU, CSU, SPD, FDP, Left party (Die Linke) and Greens.

Known on Twitter by the name "G0d," the suspect published private data about German politicians, journalists, and celebrities on Twitter, under the username @_0rbit.

Telephone numbers, private chats, and letters, some credit card data, addresses and copies of identity cards of victims were all exposed in what believed to be one of the country's biggest data breaches in the history.

Unlike as initially feared, early evidence suggests no involvement of foreign intelligence or activists for far-right Alternative for Germany (AfD), who was not targeted by the attacker, in the incident.

Besides German politicians, the intrusive hack attacks also affected well-known actor Til Schweiger, two renowned German comedians, Jan Boehmermann and Christian Ehring, as well as dozens of journalists from ZDF and ARD–public-funded German media outlets.

Germany is still in the process of removing the exposed data from the Internet, but there are no signs that any information was released that would be considered politically explosive or increase security risks.


CEEH - (Certified Expert Ethical Hacker) Certification. This Is Advance Ethical Hacking Course You Will Learn In This Course
Chapter 1- Introduction Of Ethical Hacking
Chapter 2- Cyber Crime
Chapter 3- Foot-Printing
Chapter 4- Foot-Printing Pen-Testing
Chapter 5- Scanning
Chapter 6- Proxy Server
Chapter 7- Enumeration
Chapter 8- Banner Garbing
Chapter 9- Password Hacking
Chapter 10- Windows Hacking And Securing
Chapter 11- System Hacking
Chapter 12- Virus And Worm
Chapter 13- Physical Security
Chapter 14 - Ransomware
Chapter 15 -Sniffing
Chapter 16 -Social Engineering
Chapter 17 -Session Hijacking
Chapter 18 -Dos Attack
Chapter 19 -Stenography
Chapter 20 -Cryptography
Chapter 21 -Sql Injection
Chapter 22 -Web Server & Application Hacking
Chapter 23 -Buffer Overflow
Chapter 24 -Wireless Network Hacking
Chapter 26 -Sim Card Cloning
Chapter 27 -Android Hacking
Chapter 28 -Honey Port
Chapter 29 - Batch File Programing
And So On ...
Challenge EC-Council Course CEHv10 0r Update Version
.
Contact us:

Red Securium Pvt Limited Company

Red securium company provide best ethical hacking  and cyber security training in noida.

Address: Block A, A-25, Second Floor, Sector 3, Noida, Uttar Pradesh 201301
Telephone number: +91-120 429 1672
Email: info@redsecurium.org
Mobile number: +91-7455923827
Google+ Profile: Red Securium
Facebook profile: Red Securium
Twitter Profile: Red Securium

Instagram Profile: Red Securium

Comments

Popular posts from this blog

Phishing Campaigns Targeting Google and Yahoo Accounts To Bypassing Two-Factor Authentication Several phishing campaigns targeting hundreds of individuals across the Middle East and North Africa. The attacker targers HRDs, journalists, political actors. Amnesty International published a report on multiple campaigns that traget self-described “secure email” services, such as Tutanota and ProtonMail and another campaign that aimed in bypassing two-factor authentication. Crafted Phishing Sites – Secure Email Providers The phishing campaign primarily targeted popular secure email service providers such as Tutanota and ProtonMail. Threat actors used a well-crafted phishing page – by obtaining the domain tutanota[.]org, whereas the original domain of the service provider is tutanota[.]com. A phishing attack is one of the dangerous social engineering attacks that leads to capture a victim’s username and password that will get store it to an attacker machine and reuse it l...

software development services in noida

Red Securium Company Provide Software Development  Service In Noida Combining technological competency with domain expertise, Red Securium offers full spectrum of custom software design, development and deployment services for enterprises and SMEs to achieve exceptional business results.            Leveraging on its cross-functional width of expertise in application software development , Red Securium has developed the capabilities to build and run resilient applications at scale that seamlessly infuse your innovative ideas. Whether you are in need of the rapid development of a crucial business application or require the deployment and support for an entire suite of applications, we offer full software lifecycle coverage services. We adopt best practices and put highest levels of expertise to drive your technological assets deliver you business excellence and improved ROI. Custom Software Development Services in Noida Enterpri...

Information Security Analyst Interview Questions

Top 12 Information Security Analyst Interview Questions & Answers 1) Explain what is the role of information security analyst? From small to large companies role of information security analyst includes Implementing security measures to protect computer systems, data and networks Keep himself up-to-date with on the latest intelligence which includes hackers techniques as well Preventing data loss and service interruptions Testing of data processing system and performing risk assessments Installing various security software like firewalls, data encryption and other security measures Recommending security enhancements and purchases Planning, testing and implementing network disaster plans Staff training on information and network security procedures 2) Mention what is data leakage? What are the factors that can cause data leakage? The separation or departing of IP from its intended place of storage is known as data leakage.  The factors that are respons...