The Scottish Parliament has been targeted by a brute force cyber attack, similar to that which affected Westminster in June, according to officials.
Chief executive of Holyrood Sir Paul Grice informed MSPs and staff with parliamentary email addresses of the attack in a message urging them to be vigilant.
Attackers attempted to access MSPs’ email accounts by trying to crack their passwords using an automated process of trial and error. Holyrood said that no accounts had been accessed, but that MSPs had been advised to strengthen their passwords.
It was found that too many passwords were weak enough to be cracked. Mr Grice said that the number of “simple passwords” were too high for his team to contact each individual responsible.
Mr Grice informed Holyrood staff members that the “parliament’s monitoring systems have identified that we are currently the subject of a brute force cyber attack from external sources”.
He went on to say: “The parliament’s robust cyber security measures identified this attack at an early stage and the additional security measures which we have in readiness for such situations have already been invoked. Our IT systems remain fully operational.”
Mr Grice explained that the “symptoms of the attack” include victims being locked out of their accounts or being unable to login.
It is not yet known who is behind the attack on the Scottish Parliament.
The incident can serve to remind businesses of the importance of protecting themselves. If a national parliament can be hit by cyber criminals, there is nothing stopping them attacking a company.
Businesses need to ensure they have the best managed IT security systems in place in order to prevent malicious hacks and viruses intended to disrupt or steal information.
Share This Post, Choose Your Platform!
With over 25 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.