Germany edges closer to securing new EU-wide anti-Russian sanctions on individuals connected to a 2015 hacker attack on the Bundestag. And the chances for success are looking high, as EU ambassadors edge closer to retaliating against the cyberattacks held in connection with the intelligence services of Russia, China, and North Korea.
German strategy
Kramp-Karrenbauer also stated that although there are very different perceptions of both Russia itself and the threats it poses to the EU, she has already discussed this issue with colleagues from the Nordic and Baltic countries and will raise it during her visit to the Visegrad Four (Czech Republic, Hungary, Poland, and Slovakia), as well as other EU members."We will discuss the question of how we perceive Russia not only in the light of the new military potential it is developing, particularly in the field of unconventional weapons which is already a new challenge for Europe and NATO, but also Russia's behavior. Moscow's behavior will be discussed not only in Libya or Syria but also in Ukraine, where fighting is still going on and where the situation persists that the borders in Europe have been changed by military force for the first time since World War II,” Minister Kramp-Karrenbauer said.The minister hopes the threat analysis will be completed by the end of Germany's council rotation -- December 2020. This should result in the development of a new EU strategy addressing Russian aggression and coordinating all measures the EU takes in this regard. Along with comprehensive analysis and the development of a new strategy, Germany seeks new EU sanctions against Russian citizens responsible for the 2015 cyberattack against the Bundestag, claiming that sufficient evidence has now been collected. In particular, on 13 May German Chancellor Angela Merkel said there was "hard evidence” that Russian intelligence was behind the hacker attack in which documents and emails, including thousands of emails from the offices of Merkel's Bundestag, were leaked. German Attorney General Peter Frank issued an arrest warrant against Russian hacker Dimitry Badin.
“There is reliable evidence that he was an employee of the GRU [Russian Main Intelligence Directorate] military secret service at the time of the attack,” stated the German Foreign Ministry.

“There are a number of EU member states that traditionally had better relations with Russia than other EU countries, but that does not mean that they support illegal behavior, the sort of behavior that Germany refers to. So I would not expect them to be against the listing in that sanctions regime of some individuals who would be clearly linked to the attacks on the Bundestag.”In further explaining the EU toolbox to prevent hacker attacks, Ivan clarified that the only measures the EU can take are sanctions as well as international coordination to enhance cybersecurity, not counterattacks:
“In the EU toolbox, there is nothing in terms of offensive operations, and the EU institutions do not have a mandate to use such capabilities. Capabilities in that sense exist at the level of EU member states, and most of the work that has been done in terms of cybersecurity, cyber defense, and capabilities are at the level of EU member states, not at the level of the EU institutions.”
Evidence of Russian coordination behind cyberattacks
Investigations of virtual crimes are not easy -- first of all, because of the problem of attribution. It is not easy to prove who did what and when, since not all virtual operations leave reliable traces. Moreover, false trails can put investigators on the wrong track. The consequences of the 2015 cyber-attack were so bad that the Bundestag IT office had to completely reconfigure and reboot the IT system of the German Parliament. From the very beginning, there were traces leading to Russian hackers and the GRU. Yet, other cases of cyber investigations were no less helpful.
“It is part of a larger proposal that also aims to create a Network of National Coordination Centres and a European Cybersecurity Industrial, Technology and Research Competence Centre," explains Ivan. "We are talking about mechanisms and processes to stimulate European technological, industrial research in cyber issues, to coordinate and to pull together resources at the EU level. The EU has been investing in cybersecurity for a number of years. We have had the cybersecurity strategy for seven years already. In 2016, we had a major piece of legislation -- the Directive on Security of Network and Information Systems (NIS Directive) that created among others a network of the national CSIRTs (computer emergency response teams). So this competence community and the competence centre are new steps in which the EU tries to improve EU cybersecurity capabilities.”Read also:
- Beware of Russia’s bilateral cyber world order
- Why are Russian hackers targeting COVID-19 vaccine laboratories?
- Beware of Russian Cyber Warfare in 2016
- What Surkov’s hacked emails tell about Russia’s hybrid war against Ukraine
- How states can get real about Russian cyber attacks: Estonia, the UK, and Poland explain
- Russia-linked cyber attacks targeted 104 accounts of European think tanks (2019)
- Ukrainian banks, enterprises, media and energy companies under powerful cyber attack, including Chornobyl NPP – LiveUpdates