The agency said core operations remain unaffected even as IntelBroker claimed to possess classified, law enforcement data. Credit: Europol The EU’s law enforcement agency, Europol, has fallen victim to a data breach compromising sensitive, classified data on one of its web platforms, Europol Platform for Experts (EPE). According to a Europol statement to BleepingComputer, the breach affects a small group of individuals on the EPE portal and is being proactively looked into. “Europol is aware of the incident and is assessing the situation. Initial actions have already been taken. The incident concerns a Europol Platform for Expert (EPE) closed user group,” Europol said. The confirmation comes after a threat actor within the “Cyberniggers” hacker group, IntelBroker claimed on the dark web they possessed stolen “For Office Use Only” (FOUO) documents from Europol containing classified data. Core operations remain unaffected Europol, through the statement, has assured none of the operational data has been breached as the compromised portal does not include any system critical data. The EPE website, however, is presently offline and is displaying a notification of maintenance to visitors. “No operational information is processed on this EPE application,” the agency said. “No core systems of Europol are affected and therefore, no operational data from Europol has been compromised.” The breach has brought back into focus an earlier Europol security incident reported in March which involved the disappearance of physical personal records belonging to Catherine De Bolle, Europol’s executive director, and other senior officials before September 2023. Despite the agency’s assurances of minimal impact, questions are being raised about the security of data even within high-profile government agencies like the Europol. “This incident shows hackers are few steps ahead even from Government and law enforcement sites,” said Pareekh Jain, chief analyst at Pareekh Consulting.“These law enforcement agencies need to up their security preparation with more collaboration from security tech companies, more ethical hacking, penetration testing, and bug bounties. Also, a collaboration between different state agencies like in the US, Europe, and Asia is required to keep these sophisticated hackers in check.” Massive classified data compromise IntelBroker described the data breached as containing classified information from within the FOUO section, including information on alliance employees, FOUO source code, PDFs, and documents for recon and guidelines. Additionally, the threat actor claimed to gain access to EC3 SPACE (Secure Platform for Accredited Cybercrime Experts), an EPE portal community with “hundreds of cybercrime-related materials” used by over 6,000 authorized cybercrime experts from around the world. The experts’ community includes law enforcement from EU Member States’ competent authorities as well as non-EU countries, judicial authorities, academic institutes, private companies, non-governmental and international organizations, and the Europol staff. “PRICING: Send offers. XMR ONLY. Message me on the forums for a point of contact,” IntelBroker posted on BreachForums. “Proof of funds is required. I am only selling to reputable members,” the threat actor said in a Friday post on a hacking forum. The hack post by the threat actor also boasted a compromise of the SIRIUS platform, an access portal to cross-border electronic evidence in criminal investigations, used by European law enforcement authorities. The incident marks IntelBroker’s second high-profile hack within a week, the first being a critical Zscaler breach reported on May 8. Related content news analysis APT groups increasingly attacking cloud services to gain command and control Nation-state threat groups are piling on attack techniques seen as successful in exploiting free cloud services. By Lucian Constantin 07 Aug 2024 6 mins Advanced Persistent Threats Hacker Groups Hacking news China’s APT40 group can exploit vulnerabilities within hours of public release The group — also known as Kryptonite Panda, Gingham Typhoon, Leviathan, and Bronze Mohawk — is believed to be working for China’s Ministry of State Security. By Gyana Swain 09 Jul 2024 4 mins Advanced Persistent Threats Hacker Groups Vulnerabilities news Did hackers steal 33TB of data from the Federal Reserve? The central banking system is allegedly negotiating with the ransomware gang LockBit to restore 33 terabytes of confidential banking data. By Shweta Sharma 25 Jun 2024 4 mins Data Breach Hacker Groups news Car dealerships face continued disruption as CDK works to restore hacked systems Despite initial attempts to restore services, a secondary cyber incident on Wednesday evening caused further disruptions, necessitating another shutdown. By Gyana Swain 24 Jun 2024 4 mins Hacker Groups Ransomware PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe