• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Russia Suspected in Truss Phone Hacking Scandal

You are here: Home / General Cyber Security News / Russia Suspected in Truss Phone Hacking Scandal
October 31, 2022

Former UK Prime Minister Liz Truss’s personal phone was hacked before this 12 months by suspected foreign brokers, placing nationwide security at risk, according to a new report on Sunday.

Unnamed “security sources” explained to the Mail on Sunday that the incident was learned in the course of the Conservative Party leadership contest above the summer time, leading to Truss sleepless evenings as she concerned it may influence her likelihood of winning.

Nevertheless, then-Key Minister Boris Johnson and cabinet secretary Simon Case are explained to have imposed a total news blackout on the incident.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“It is not a great glance for the intelligence providers if the foreign secretary’s phone can be so quickly plundered for uncomfortable private messages by brokers presumed to be functioning for Vladimir Putin’s Russia,” a security supply advised the paper.

No evidence was supplied linking the breach to the Kremlin, whilst it’s thought that a year’s really worth of messages had been downloaded from Truss’s machine by an unauthorized intruder.

These apparently bundled “highly sensitive” discussions with other countries’ foreign ministers about the war in Ukraine, which includes in depth discussions about arms shipments.

The use by ministers of individual products and customer-quality solutions for governing administration small business is generating unacceptable countrywide security pitfalls, in accordance to security authorities.

Dwelling secretary Suella Braverman was lately compelled to resign following it was uncovered that she applied her personalized email to send a confidential federal government document on immigration policy to a Tory backbencher. She was subsequently reappointed by incoming PM Rishi Sunak.

ESET worldwide cybersecurity advisor, Jake Moore, pointed to notorious phone-snooping malware Pegasus as a possible perpetrator for the Truss attack.

“Its quiet, under-the-radar shipping technique permits it to monitor the huge the greater part of a system and individuals focused will have no plan of its home,” he argued.

“High-profile people today these kinds of as politicians are usually qualified, so it is extremely crucial they preserve their personalized phone selection non-public and to improve it instantly if ever leaked. It is also very important that they continue to keep their phones up to date and patched with the most current security updates to decrease the possibility of these kinds of attacks.”

Achi Lewis, spot VP EMEA for Absolute Program, added that every person in an organization is a prospective target.

“From the Prime Minister to a new joiner, each individual opportunity employee and endpoint is at risk of a cyber-attack,” he explained.

“All customers of staff members and electronic products contain sensitive facts in some type which tends to make them susceptible to danger actors and calls for that they not only have adequate cyber-instruction to identify the potential risks but also powerful cybersecurity systems to both equally avoid and respond when – not if – an attack happens.”


Some areas of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «github repojacking bug could've allowed attackers to takeover other users' GitHub Repojacking Bug Could’ve Allowed Attackers to Takeover Other Users’ Repositories
Next Post: Samsung Galaxy Store Bug Could’ve Let Hackers Secretly Install Apps on Targeted Devices samsung galaxy store bug could've let hackers secretly install apps»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.