MESOPOTAMIA NEWS : EU ESPIONAGE REPORT & CHINA

 

State-level espionage on EU tagged as ‘Very High Threat’

  • The European Council : By Nikolaj Nielsen EUOBSERVER – Brussels, 2. Jun, 07:01

The most successful attempts of espionage at a top EU institution are state sponsored, according to an internal document.

The restricted document presents an analysis of threats to the security of information at the General Secretariat of the Council (GSC). The GSC administers over the Council, representing member states, as well as the more politically-oriented European Council.

“The majority of discovered, successful compromises of information in the GSC are from threat source level VERY HIGH (e.g. state sponsored attacks),” notes the document, dated 26 May and obtained by this website.

The GSC is a prime target because it deals with the negotiation and adoption of EU laws, coordinates member state policies, and develops the EU’s common foreign and security policy.

It also helps negotiations on international agreements.

“Any country with a conflict between their national and EU interests or which may have an interest in EU information only, may try to undertake an attack on the security of information handled in GSC,” it says.

The 28-page document was drafted by the Council’s security committee.

It does not provide specific examples.

But it does highlight China, noting the country had in 2016 led the world in espionage malware, followed by Russia and the rest of Europe.

“The GSC can also be attacked via systems located in EU member states,” it adds.

The most common attacks include phishing emails, enticing people to either click on a link or open an attachment.

One such attack took place in late November 2018 when a phishing campaign hacked into a network at the Cypriot ministry of foreign affairs.

The network was ultra-sensitive because the European Union uses it to facilitate cooperation on foreign policy issues.

Known as COREU, the network operates between the EU states, the Council of the European Union, the EU’s foreign policy branch (EEAS) and the European Commission.

Experts says the campaign had been led by the Chinese government via its Strategic Support Force of the People’s Liberation Army.

State-sponsored espionage is not the only threat.

Four threat-levels

The document spells out four levels of threat.

It classifies as low amateur hackers and open source researchers. Medium is reserved for insiders who do not have privileged access to systems.

High level is for “hactivists”, privileged insiders, and any organisation carrying out cyber crime.

“The insider threat (deliberate actions by GSC staff against the security of information) is rare as evidenced by past incidents (only one case),” it notes.

Very high is for those carrying out government orders to hack systems.

The Council internal document’s findings was compiled by the EU’s intelligence centre (Intcen), US government sources, the Computer Emergency Response Team for the EU Institutions known as CERT-EU, Kaspersky Lab, Microsoft, among others.

The probe took place throughout 2017 and was updated in November last year.