{"id":33055,"date":"2020-01-30T15:06:07","date_gmt":"2020-01-30T15:06:07","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30892\/UN-Withheld-News-Of-Systems-Hack-In-European-Offices.html"},"modified":"2020-01-30T15:06:07","modified_gmt":"2020-01-30T15:06:07","slug":"un-withheld-news-of-systems-hack-in-european-offices","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/","title":{"rendered":"UN Withheld News Of Systems Hack In European Offices"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2019\/10\/United-Nations-1024x683.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"wysiwyg\">\n<p>Officials at the United Nations reportedly discovered last August that hackers had compromised its IT systems in Geneva and Vienna last summer, but the cyber espionage attack remained undisclosed until it was revealed on Wednesday in an <a href=\"http:\/\/%E2%80%9CThe%20news%20that%20the%20United%20Nations%20was%20the%20victim%20of%20an%20advanced%20persistent%20threat%20(APT),%20likely%20state-sponsored,%20for%20the%20purposes%20of%20espionage,%20is%20not%20all%20that%20surprising,&quot;%20said%20Rui%20Lopes,%20engineering%20and%20technical%20support%20director%20at%20Panda%20Security.%20:The%20UN%20maintains%20critical%20data%20at%20a%20global%20scale%20that%20multiple%20states%20and%20organizations%20would%20like%20to%20have%20their%20hands%20on,%20and%20this%20level%20of%20sophistication%20is%20indicative%20of%20that%20purpose.%20What%20may%20strike%20as%20surprising%20is%20the%20UN%E2%80%99s%20IT%20security%20strategy%20likely%20not%20including%20a%20strong%20endpoint%20protection%20posture,%20including%20data%20access%20monitoring%20and%20control%20as%20well%20as%20threat%20hunting,%20thus%20allowing%20bad%20actors%20to%20exfiltrate%20untold%20amounts%20of%20data.%E2%80%9D\">expos\u00e9<\/a> by The New Humanitarian (TNH).<\/p>\n<p>TNH, which once operated under the auspices of the UN Office for the Coordination of Humanitarian Affairs, learned of the incident after obtaining an internal UN alert, dated Sept. 20, 2019, which shared certain details of the hack. A copy of the alert, which was prepared by the UN Office at Geneva, was subsequently <a href=\"https:\/\/apnews.com\/0d958e15d7f5081dd612f07482f48b73\">shared with the Associated Press<\/a>.<\/p>\n<p>The sophisticated attack reportedly affected multiple servers in the main UN offices in Geneva and Vienna, plus the UN Office of the High Commissioner for Human Rights headquarters in Geneva. St\u00e9phane Dujarric, UN spokesperson for the secretary-general, reportedly acknowledged to TNH that the hack affected \u201ccore infrastructure components.\u201d These components reportedly included human resources, printing, antivirus, user and password management, system controls and security firewalls.<\/p>\n<p>The intrusion took place in mid-July and was subsequently discovered on Aug. 30, but most staff members in the affected facilities \u2014 roughly 4,000 staffers in total \u2014 were not informed that their data may have been compromised. The only ones who were told were internal IT teams and the chiefs of the main Geneva and Vienna offices.<\/p>\n<p>The UN is not subject to global privacy regulations such as GDPR, meaning the body can act with impunity when choosing not to disclose a breach, TNH said, citing legal experts.<\/p>\n<p>The AP reported that 42 servers were confirmed as compromised, with another 25 possibly affected. It has not been confirmed precisely what data was taken or how much, although one anonymous senior UN IT official, who complained about his organization\u2019s \u201ccover-up culture,\u201d&nbsp;reportedly told TNH that an estimated 400 GB of data was downloaded.<\/p>\n<p>The UN\u2019s alert suggests that that internal documents, databases, emails, commercial information and personal data may have been exfiltrated, TNH reported. The attackers reportedly breached admin accounts and stole at least one Active Directory, which the UN report says likely lists out user data, human resources and health insurance systems, additional databases and network resources. Such a wealth of information could potentially be used to facilitate future targeted attacks against affected UN staffers, including as phishing emails.<\/p>\n<p>In a <a href=\"https:\/\/www.un.org\/press\/en\/2020\/db200129.doc.htm\">press briefing<\/a> today, Dujarric downplayed the impact of the breach. Asked why the UN didn\u2019t publicly disclose an attack on computers carrying sensitive data on humanitarian and human rights, partner organizations and aid agencies,&nbsp;, the spokesperson responded, \u201cThe server in Geneva that you are referring to was part of a development environment and contained non-sensitive test data from two development servers used for web application.&nbsp; People who needed to be notified were notified.\u201d<\/p>\n<p>Earlier, TNH said that Dujarric told the publication that the UN offices opted not to disclose the breach, \u201cas the exact nature and scope of the incident could not be determined.\u201d<\/p>\n<p>\u201c\u2026The UN is no different from any organization or individuals. The threat of future attacks continues, and the UN\u2026 our colleagues at the Secretariat detect and respond to multiple attacks at various level of sophistication on a daily basis,\u201d Dujarric said during the press briefing. \u201cThis particular attack\u2026 is not a landmark event, he continued, noting that \u201cattempts to attack the UN IT infrastructure happen often.\u201d<\/p>\n<p>In a statement, the Office of Human Rights in Geneva acknowledged that its Active Directory was stolen, but said sensitive data wasn\u2019t affected because the hackers broke into development servers not connected to its regular systems.<\/p>\n<p>\u201cAlthough hackers accessed a self-contained part of our system in July 2019, the development servers they accessed did not hold any sensitive data or confidential information,\u201d the statement read. \u201cThe hackers did manage to access our Active User Directory, which contains the user IDs for our staff and devices. However, they did not succeed in accessing passwords. Nor did they gain access to other parts of the system.\u201d<\/p>\n<p>\u201cOnce we became aware of the attack, we took action to shut down the affected development servers,\u201d the statement continued.<\/p>\n<p>The attacker remains unknown, but Dujarric did note in his briefing that the incident was, \u201cfrom all accounts, a well-resourced attack.\u201d<\/p>\n<p>\u201cThe news that the United Nations was the victim of an advanced persistent threat (APT), likely state-sponsored, for the purposes of espionage, is not all that surprising,\u201d said Rui Lopes, engineering and technical support director at&nbsp;Panda Security. :The UN maintains critical data at a global scale that multiple states and organizations would like to have their hands on, and this level of sophistication is indicative of that purpose. What may strike as surprising is the UN\u2019s IT security strategy likely not including a strong endpoint protection posture, including data access monitoring and control as well as threat hunting, thus allowing bad actors to exfiltrate untold amounts of data.\u201d<\/p>\n<p>Hank Thomas, CTO and board director at&nbsp;SCVX, speculated on the attacker\u2019s motive: \u201cBoth Vienna and the UN are well-known for being frequent stomping grounds for the worlds intelligence and security services. The target\u2026 suggests the perpetrator is an autocratic regime looking to see what sort of report card they are getting from the UN, with eyes on how to change their poor grades moving forward,\u201d said Thomas to SC Media. \u201cI assume that whomever is behind this is looking to identify key stakeholders and recruit them to increasingly overlook their poor behavior and to learn about sources the UN is using to gather information on their human rights abuses inside their countries.\u201d<\/p>\n<p>According to the AP, the UN report said the attackers exploited a flaw in Microsoft\u2019s SharePoint software to deliver an unknown malware. \u201cFor years, these app vulnerability attacks have successfully disrupted operations and leaked sensitive information,\u201d said Craig Hinkley, CEO at WhiteHat Security, in emailed comments.<\/p>\n<p>Security researcher Matt Suiche, founder of Comae Technologies, reportedly reviewed the report and told the AP the attackers may have gotten in via an anti-corruption tracker at the U.N. Office of Drugs and Crime.<\/p>\n<p>Dujarric reportedly told TNH that the UN in December 2019 agreed upon a \u201ccomprehensive containment, mitigation and recovery plan\u201d that would require rebuilding the IT infrastructure, replacing keys and credentials and adding more technical and procedural controls.<\/p>\n<\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p><a href=\"https:\/\/www.scmagazine.com\/tag\/cyber-espionage\/\" class=\"button -secondary\">Cyber Espionage<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/cybercrime\/\" class=\"button -secondary\">Cybercrime<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/data-breach\/\" class=\"button -secondary\">Data Breach<\/a><\/section>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30892\/UN-Withheld-News-Of-Systems-Hack-In-European-Offices.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33056,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[2034],"class_list":["post-33055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentdata-losscyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UN Withheld News Of Systems Hack In European Offices 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UN Withheld News Of Systems Hack In European Offices 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-30T15:06:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-withheld-news-of-systems-hack-in-european-offices.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UN Withheld News Of Systems Hack In European Offices\",\"datePublished\":\"2020-01-30T15:06:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/\"},\"wordCount\":1064,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-withheld-news-of-systems-hack-in-european-offices.jpg\",\"keywords\":[\"headline,hacker,government,data loss,cyberwar\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/\",\"name\":\"UN Withheld News Of Systems Hack In European Offices 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-withheld-news-of-systems-hack-in-european-offices.jpg\",\"datePublished\":\"2020-01-30T15:06:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-withheld-news-of-systems-hack-in-european-offices.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-withheld-news-of-systems-hack-in-european-offices.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-withheld-news-of-systems-hack-in-european-offices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,data loss,cyberwar\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentdata-losscyberwar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"UN Withheld News Of Systems Hack In European Offices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UN Withheld News Of Systems Hack In European Offices 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/","og_locale":"en_US","og_type":"article","og_title":"UN Withheld News Of Systems Hack In European Offices 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-30T15:06:07+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-withheld-news-of-systems-hack-in-european-offices.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UN Withheld News Of Systems Hack In European Offices","datePublished":"2020-01-30T15:06:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/"},"wordCount":1064,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-withheld-news-of-systems-hack-in-european-offices.jpg","keywords":["headline,hacker,government,data loss,cyberwar"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/","url":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/","name":"UN Withheld News Of Systems Hack In European Offices 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-withheld-news-of-systems-hack-in-european-offices.jpg","datePublished":"2020-01-30T15:06:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-withheld-news-of-systems-hack-in-european-offices.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-withheld-news-of-systems-hack-in-european-offices.jpg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/un-withheld-news-of-systems-hack-in-european-offices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,data loss,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentdata-losscyberwar\/"},{"@type":"ListItem","position":3,"name":"UN Withheld News Of Systems Hack In European Offices"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33055"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33055\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33056"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}