The hacking of at least 40.000 European Parliament (EP) emails does not appear to be a singular event, but the latest in a series of worrying IT security breaches.
On Thursday, the French website Mediapart reported that an anonymous hacker had accessed confidential emails of MEPs and other staff of the European Parliament (EP).
The attacker described the hacking as “child’s play” saying he only used “ridiculous” computer equipment.
The Austrian MEP Martin Ehrenhauser received a list with metadata of 40.000 emails from different institutions, including the European Parliament and the German Bundestag. According to Ehrenhauser, a connection between the list and the cyber attack is very likely.
The hacking sparked a discussion about how vulnerable the European Parliament is to cyber attacks.
MEPs criticised that the EP was using out-of-date software and did not allow its staff to encrypt their communication.
Security concerns not taken seriously
It is not the first time the EU’s IT services face claims of not doing enough to protect confidential data and communication.
In April 2011, the Austrian MEP Hans-Peter Martin reported to Klaus Welle, the EP General Secretary, that his private emails were accessed from another office within the European parliament.
The European Parliament has not reacted to his report down to the present day, Martin says.
In another case, Heiko Frenzel, author of Sicherheit-Online (security online), wrote in October 2011 that he had contacted the European Commission (EC) to inform them about 40 security loopholes on EU servers.
“The first ten hints, which were sent over a period of time, were simply ignored, some of them deleted unread,” Frenzel said.
According to Frenzel, it took the European institution almost one year, until September 2012, to deal with the breaches.
European Parliament should improve its IT services
EU leaders are pushing forward new legislation to protect citizens’ data amid continuous revelations about the NSA’s spying activities in Europe.
If the EP wants to be taken as a serious negotiating party in cyber security issues, it should, first of all, aim at improving its own IT services and making it impossible for hackers to access confidential data with elementary computer equipment.