He declined to give any further information, saying that the attack was continuing, as was an investigation into who might be behind it. “A public discussion would serve as a warning to the attackers that we simply do not want to give them,” Mr. Schuster said.
Germany’s Interior Ministry confirmed the attack on Wednesday, describing it as “isolated” and having been “brought under control.” But the ministry would not say whether Russian hackers were responsible, and declined to give any more details.
The attack comes two years after German security officials determined that Fancy Bear hackers were able to breach the German Parliament’s data network, leading to calls for increased security on the country’s most sensitive systems.
The same group has been accused of breaching the computer servers of the Democratic National Committee in the United States, leading to the release of embarrassing emails during the 2016 campaign, and of targeting Olympic athletes and circulating their emails.
Newsletter Sign Up
Thank you for subscribing.
An error has occurred. Please try again later.
You are already subscribed to this email.
German security officials warned in the months leading up to a national election in September that the country remained vulnerable to “cyberespionage,” but the country appeared to have escaped any attacks on the level of those seen during the presidential campaigns in the United States and France.
Süddeutsche Zeitung, a left-leaning German daily, reported that the country’s Foreign Ministry had been among the targets of the most recent attack, citing anonymous sources within the ministry. That information, while unconfirmed, was supported by a report by Palo Alto Networks, a cyber security firm, pointing to what it called “a new set of attacks” by Russian hackers that appeared to be aimed at the diplomatic community in the West.
Investigators with Palo Alto Networks said that groups associated with Fancy Bear had used “malicious emails targeting foreign affairs agencies and ministries in North America and Europe, including a European embassy in Moscow.” German media reported that the country’s Defense Ministry had also been targeted.
Mr. Sensburg refused to place blame on the Russians, insisting that the authorities would need time to determine who was behind the attack.
“Whether this really was the work of this hacking collective must be carefully investigated,” he told ZDF, a public broadcaster, before the parliamentary committee convened on Thursday. “As this involved the government network, which is used for communication and email traffic and a lot of daily exchanges, but does not primarily involve secret or top-secret information, it must also be carefully examined whether data has been leaked.”
Unlike the 2015 hacking attack on the German Parliament, which succeeded in breaching the system and making off with 16 gigabytes of sensitive information, Mr. Sensburg said the most recent attack appeared to be more refined, clearly targeting specific information.
Despite attempts to play down the communication exchanged on the government network, known as the IVBB, it would be of interest for anyone seeking to spy on German intelligence. The network allows the chancellery, ministries, security services and federal auditing office to exchange information with one another. Offices in Bonn, the former West German capital, and in Berlin, are included on the specially secured network.
Efforts to bolster Germany’s data security have been a point of debate for months. The country’s military is allowed to legally initiate a cyber-offensive to combat a hacking attack on its resources, but there is no such law that would permit similar defense of the country’s civilian infrastructure.