Close Menu
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations

Trending

Rising public anger makes rushing CAB3 a growing stability risk for Zimbabwe and the region

May 14, 2026

Bahrain uncovers Iran’s latest subversion network

May 13, 2026

Ramaphosa’s Zimbabwe visit puts constitutional crisis, not succession, at centre of regional concern

May 12, 2026

UK sanctions Iranian targets in response to national security threats

May 12, 2026
Facebook X (Twitter) Instagram
National Security News
Subscribe
X (Twitter)
Login
IPSO Trusted Journalism in National Security
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
Home»Cyber
Cyber

Swiss politicians’ accounts hacked – investigation by Proton and Constella reveals

Staff WriterBy Staff WriterJune 25, 20253 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Listen to the article

0:00
0:00

Key Takeaways

🌐 Translate Article

Translating...

📖 Read Along

💬 AI Assistant

🤖
Hi! I'm here to help you understand this article. Ask me anything about the content!
(Source – Proton)

By Sean Rayment

Sensitive information belonging to Swiss politicians has surfaced on the darknet, according to the newspaper Tages-Anzeiger.

An investigation by Swiss technology company Proton and US firm Constella Intelligence, a leading cybersecurity company, reveals that around 16 per cent of members of the Federal Council, National Council, and Council of States are affected. A total of 44 email accounts and 78 passwords were discovered.

According to Proton, many politicians had used their official email addresses to register on platforms such as LinkedIn, Dropbox, or Adobe—services that were later hacked.

Embarrassingly, three politicians reportedly used their parliamentary email addresses to sign up for dating or adult websites.

One of the politicians whose accounts were compromised has been named, though Proton is not disclosing any further details. Those affected have been informed so they can take remedial action.

The breach underscores the critical need for robust cybersecurity measures for all online users—from private citizens to government officials.

Although individual accounts were compromised, Swiss parliamentary services have stated that the official @parl.ch mailboxes were not affected. These accounts are protected by multi-level security protocols and are regularly monitored, according to Swiss authorities. In addition, regular cybersecurity awareness campaigns are conducted during parliamentary sessions.

However, according to Proton, beyond email addresses and passwords, other personal information—including phone numbers, credit card details, and home addresses—has also appeared on the darknet. Previous studies suggest that similar vulnerabilities exist in other countries.

Cybersecurity expert Nicolas Mayencourt sees the findings as indicative of a widespread lack of awareness. Speaking to Tages-Anzeiger, he warned that personal data remains dangerously accessible and called for the strict separation of personal and official accounts, as well as the use of password managers and multi-factor authentication.

Alberto Casares, Chief Technology Officer at Constella Intelligence, told National Security News last year that terrorists and state actors have developed tools capable of automatically scanning computer systems for vulnerabilities.

Once weaknesses are identified, attackers can target victims using specific types of malware known as “info-stealers.”

He explained: “What we’ve seen in recent months is that these threat actors are increasingly using techniques focused on targeting Israeli citizens and critical infrastructure.

“In some cases, they exploit information compromised by an info-stealer—a type of malware that extracts data from a device by embedding itself in seemingly legitimate software, including video games or even PDF documents.

“They wait for the victim to click and download the malicious software. Once that happens, the attacker receives an alert and begins analysing the stolen data.

“This malware can access browser history, saved passwords, cookies (which are extremely valuable), and even sensitive documents stored on the device. With this information, the attacker can bypass multi-factor authentication and hijack accounts. It’s a sophisticated form of attack, but alarmingly easy to learn.”

Constella Intelligence is equipped to analyse data from such breaches, and Casares noted that hundreds of breaches occur globally each day.

Despite the growing sophistication of cyberattacks, Casares stressed that organisations can still protect themselves by taking the right precautions.

“First of all,” he said, “awareness is crucial, as most infections occur when users click on or download malicious programs. We’ve even seen legitimate-looking PDF files—copied from authentic sources—used to deliver malware.

“So, the first defence is awareness. Be careful not to click on or download files from suspicious websites.

“The second is to ensure your software is kept up to date and you are using antivirus protection. These are some of the most effective defences against cyberattacks.”

Follow on Google News Follow on X (Twitter)
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Staff Writer

Keep Reading

White House formally adds offensive cyberattacks to US counterterrorism strategy

GCHQ cyber agency urges millions to switch from passwords to passkeys

America’s cyber fortress: Trump’s new strategy places critical infrastructure at the heart of national defence

ITC Secure and IronNet unite to form Collective Defence

Scientists at secret military base at centre of Novichok murder probe fear their details may have been stolen by cyber criminals

Two leading cyber companies sign agreement to launch AI powered cyber security defence system

Editor's Picks

Bahrain uncovers Iran’s latest subversion network

May 13, 2026

Ramaphosa’s Zimbabwe visit puts constitutional crisis, not succession, at centre of regional concern

May 12, 2026

UK sanctions Iranian targets in response to national security threats

May 12, 2026

White House formally adds offensive cyberattacks to US counterterrorism strategy

May 11, 2026

Trending

UK sanctions Iranian targets in response to national security threats

Defence May 12, 2026

White House formally adds offensive cyberattacks to US counterterrorism strategy

Cyber May 11, 2026

Whose money was in Ramaphosa’s sofa?

South Africa May 11, 2026
Facebook X (Twitter) TikTok Instagram LinkedIn
© 2026 National Security News. All Rights Reserved.
  • About us
  • Privacy Policy
  • Terms
  • Contact
Home Topics Podcast NSN Lists

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?