United Nations hit by possible state-sponsored attack
At least 40 servers were compromised over three separate European offices, according to a leaked report


Hackers managed to infiltrate a slew of servers at three separate United Nation offices last year in what is reported as apparent espionage action.
The extent of the hack, along with the identity of the perpetrators are unknown, and the attack itself has only just come to light thanks to a leaked document reported by The New Humanitarian.
At least 40 servers at UN offices in Vienna, Geneva and the UN Office of the High Commissioner for Human rights - also located in Geneva - were compromised, according to the leaked document dated 20 September 2019.
The UN suffered a "major meltdown", an unnamed UN official told TNH, and "Multiple workshops and assessments have been conducted to verify that the exploited vulnerabilities have been mitigated."
The cyber attack was so "sophisticated" that it was possibly the work of a state-backed actor, another official told the Associated Press.
"It's as if someone were walking in the sand, and swept up their tracks with a broom afterward," the official said. "There's not even a trace of a cleanup."
The attack began in the middle of July last year and was first reported by an IT official working at the Geneva office on 30 August: "We are working under the assumption that the entire domain is compromised. The attacker doesn't show signs of activity so far, we assume they established their position and are dormant."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It also included systems for the UN's human rights and human resources departments and breached some administrator accounts. The affected system included core infrastructure where user and management passwords, system controls and security firewalls were stored. Despite not being told what had happened, staff were asked to change their passwords.
RELATED RESOURCE
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in software
"The attack resulted in a compromise of core infrastructure components," said UN spokesperson Stéphane Dujarric, according to TNH. "As the exact nature and scope of the incident could not be determined, [the UN offices in Geneva and Vienna] decided not to publicly disclose the breach."
The UN has diplomatic status and is therefore immune from the legal process, so there is no regulation enforcing it to disclose breaches of data.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan