www.infosecurity-magazine.com Open in urlscan Pro
18.66.122.53  Public Scan

URL: https://www.infosecurity-magazine.com/news/russia-suspected-in-truss-phone/
Submission: On November 08 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Infosecurity Group Websites
 * 
 * Magazine
 * Events
   * Infosecurity Europe
   * Infosecurity Leadership Summit
   * Infosecurity Magazine Events
   * Infosecurity North America
   * Infosecurity Netherlands
   * Infosecurity Belgium
   * Infosecurity Russia
   * Infosecurity Mexico
   * Infosecurity Middle East
 * Insight
   * Infosecurity Webinars
   * Infosecurity Whitepapers
   * Infosecurity Online Summits

 * Log In
 * Sign Up

 * ×
   
   search
    

 * News
 * Magazine Features
 * Opinions
 * News Features
 * Interviews
 * Editorial
 * Blogs
 * Reviews
 * Slackspace
 * Next-Gen Infosec
 * Webinars
 * White Papers
 * Podcasts
 * Industry Events & Training
 * Magazine Events
 * Online Summits
 * Company Directory

 * Application Security
 * Automation
 * Big Data
 * Business Continuity
 * Cloud Security
 * Compliance
 * Cybercrime
 * Data Protection
 * Digital Forensics
 * Encryption
 * Human Factor
 * Identity Access Management
 * Industry Announcements
 * Internet Security
 * Malware
 * Managed Services
 * Mobile Security
 * Network Security
 * Payment Security
 * Physical and Information Security Convergence
 * Privacy
 * Risk Management
 * The Internet of Things
 * Infosec Blog

 * Log In
 * Sign Up


Latest
 * Medibank Refuses to Pay Ransom After Data Breach
 * Android RAT Group Targets Indian Defense Personnel
 * Cyber Insurance Market Stabilizing as Security Awareness Improves
 * #HowTo: Secure Your Cloud Migration
 * Japan Joins Key NATO Cyber Agency



 *  
 * News
 * Topics
 * Features
 * Webinars
 * White Papers
 * Podcasts
 * Events & Conferences
 * Directory
 * Search
   * ×
     
     search
      


Infosecurity Magazine Home » News » Russia Suspected in Truss Phone Hacking
Scandal
31 Oct 2022 News


RUSSIA SUSPECTED IN TRUSS PHONE HACKING SCANDAL

PHIL MUNCASTER UK / EMEA NEWS REPORTER, INFOSECURITY MAGAZINE

 * Email Phil
 * Follow @philmuncaster



Former UK Prime Minister Liz Truss’s personal phone was hacked earlier this year
by suspected foreign agents, putting national security at risk, according to a
new report on Sunday.

Unnamed “security sources” told the Mail on Sunday that the incident was
discovered during the Conservative Party leadership contest over the summer,
causing Truss sleepless nights as she worried it may impact her chances of
winning.

However, then-Prime Minister Boris Johnson and cabinet secretary Simon Case are
said to have imposed a total news blackout on the incident.

“It is not a great look for the intelligence services if the foreign secretary’s
phone can be so easily plundered for embarrassing personal messages by agents
presumed to be working for Vladimir Putin’s Russia,” a security source told the
paper.

No evidence was given linking the breach to the Kremlin, although it’s believed
that a year’s worth of messages were downloaded from Truss’s device by an
unauthorized intruder.

These apparently included “highly sensitive” conversations with other countries’
foreign ministers about the war in Ukraine, including detailed discussions about
arms shipments.

The use by ministers of personal devices and consumer-grade services for
government business is creating unacceptable national security risks, according
to security experts.

Home secretary Suella Braverman was recently forced to resign after it was
revealed that she used her personal email to send a confidential government
document on immigration policy to a Tory backbencher. She was subsequently
reappointed by incoming PM Rishi Sunak.

ESET global cybersecurity advisor, Jake Moore, pointed to notorious
phone-snooping malware Pegasus as a potential culprit for the Truss attack.

“Its quiet, under-the-radar delivery method enables it to monitor the vast
majority of a device and those targeted will have no idea of its residence,” he
argued.

“High-profile people such as politicians are often targeted, so it is extremely
important they keep their personal phone number private and to change it
immediately if ever leaked. It is also imperative that they keep their phones up
to date and patched with the latest security updates to reduce the chance of
such attacks.”

Achi Lewis, area VP EMEA for Absolute Software, added that everyone in an
organization is a potential target.

“From the Prime Minister to a new joiner, every potential employee and endpoint
is at risk of a cyber-attack,” he said.

“All members of staff and electronic devices contain sensitive data in some form
which makes them vulnerable to threat actors and requires that they not only
have sufficient cyber-training to identify the dangers but also effective
cybersecurity technologies to both prevent and react when – not if – an attack
occurs.”


Related to This Story
 * Why Cybersecurity Is More Important Now Than Ever
 * Interview: Microsoft Shares Its Experience of Migrating Data in Times of
   Cyber Warfare
 * Apple Sues “State-Sponsored” Spyware Firm NSO Group
 * Local Authority Sets Aside £380k for Cyber-Attack Recovery
 * Nine State Department Phones Hijacked by Spyware


WHAT’S HOT ON INFOSECURITY MAGAZINE?

 * Read
 * Shared
 * Watched
 * Editor's Choice

1
8 Jul 2021 News


NEW PRINTNIGHTMARE PATCH CAN BE BYPASSED, SAY RESEARCHERS


2
8 Jul 2021 News


CYBERCRIME COSTS ORGANIZATIONS NEARLY $1.79 MILLION PER MINUTE


3
8 Jul 2021 News


CTOS KEEPING QUIET ON BREACHES TO AVOID CYBER BLAME GAME


4
7 Jul 2021 News


OVER 170 SCAM CRYPTOMINING APPS CHARGE FOR NON-EXISTENT SERVICES


5
7 Jul 2021 News


MOST INSIDER DATA BREACHES AREN'T MALICIOUS


6
7 Jul 2021 News


KREMLIN HACKERS REPORTEDLY BREACHED REPUBLICAN NATIONAL COMMITTEE



1
7 Nov 2022 News


VULTUR ANDROID BANKING TROJAN REACHES 100,000+ DOWNLOADS ON GOOGLE PLAY STORE


2
7 Nov 2022 News


MEDIBANK REFUSES TO PAY RANSOM AFTER DATA BREACH


3
7 Nov 2022 News


ANDROID RAT GROUP TARGETS INDIAN DEFENSE PERSONNEL


4
7 Nov 2022 News


CYBER INSURANCE MARKET STABILIZING AS SECURITY AWARENESS IMPROVES


5
7 Nov 2022 Opinion


#HOWTO: SECURE YOUR CLOUD MIGRATION


6
7 Nov 2022 News


JAPAN JOINS KEY NATO CYBER AGENCY



1
8 Jul 2021 Webinar


OVERCOMING 'SHADOW IT' NEED AND RISK


2
23 Sep 2021 Webinar


HOW TO RETHINK END-USER PROTECTION AND ELIMINATE PHISHING AND RANSOMWARE


3
21 Oct 2021 Webinar


MACHINE ID MANAGEMENT AND DIGITAL TRANSFORMATION: BUILDING A SECURE FUTURE


4
16 Sep 2021 Webinar


NEW STRATEGIES FOR MANAGING MACHINE IDENTITIES


5
7 Oct 2021 Webinar


THIRD-PARTY VULNERABILITIES: DEMYSTIFYING THE UNKNOWN


6
24 Jun 2021 Webinar


DEFINING THE ZERO TRUST AND SASE RELATIONSHIP



1
3 Feb 2022 Podcast


INTOSECURITY CHATS, EPISODE 8: BRIAN HONAN, BROUGHT TO YOU BY HP


2
11 Aug 2022 News


#BHUSA: RUSSIA'S WIPER ATTACKS AGAINST UKRAINE DETAILED


3
15 Aug 2022 Blog


HELLO FROM YOUR NEW EDITOR


4
11 Aug 2022 News


#BHUSA: THE CYBER SAFETY REVIEW BOARD OUTLINES LOG4J LESSONS


5
15 Aug 2022 News


#DEFCON: HOW SANCTIONS IMPACT INTERNET OPERATORS


6
15 Aug 2022 News


LUCKYMOUSE USES COMPROMISED MIMI CHAT APP TO TARGET WINDOWS AND LINUX SYSTEMS




 * The Magazine
 * About Infosecurity
 * Subscription
 * Meet the Team
 * Contact Us
 * Cookies Settings

 * Advertisers
 * Media Pack

 * Contributors
 * Forward Features
 * Op-ed
 * Next-Gen Submission

 * Copyright © 2022 Reed Exhibitions Ltd.
 * Terms and Conditions
 * Privacy Policy
 * Intellectual property statement
 * Cookie Policy
 * Sitemap
 * 

Please wait…









We use cookies to analyse and improve our service, to improve and personalise
content, advertising and your digital experience. We also share information
about your use of our site with our social media, advertising and analytics
partners. Cookie Policy

Accept All Cookies
Cookies Settings



COOKIE PREFERENCE CENTRE

We process your information, to deliver content or advertisements and measure
the delivery of such content or advertisements, extract insights, and generate
reports to understand service usage; and/or accessing or storing information on
devices for that purpose.

You can choose not to allow some types of cookies. However, blocking some types
of cookies may impact your experience of the site and the services we are able
to offer. Click on the different category headings to find out more, to change
our default settings, and/or view the list of Google Ad-Tech Vendors.


Cookie Policy



MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.



Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎

UNCATEGORISED COOKIES

Uncategorised cookies

Uncategorised cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

 * HOST DESCRIPTION
   
   View Cookies
   
   REPLACE-WITH-DYANMIC-HOST-ID
    * Name
      cookie name

Confirm My Choices