Knowledge

Proton warns that data of thousands politicians leaked on the dark web

Take action: Never recycle passwords on multiple sites, and don't use official email address to register to internet services unless those services are used for company work. Too many companies get hacked and all the data you have entered is stolen and sold. If you can be identified with an official email address, all that stolen data can be abused in various ways - from phishing and scams to full identity theft.


Learn More

An investigation uncovered that the email addresses and sensitive information of over 4,109 British MPs, European Parliament members, French deputies and senators, and U.S. political staffers were exposed on the dark web.

The investigation, conducted by Constella Intelligence and Proton in two phases — May and September 2024 — aimed to assess the security of official government email addresses used by these individuals.

The investigation revealed that sensitive personal information, including dates of birth, home addresses, and social media accounts, was linked to these official email addresses. Additionally, 2,545 passwords, some in plaintext, were discovered across all regions examined.

  1. British MPs: British MPs faced the highest exposure, with 68% of the 650 searched email addresses appearing on dark web marketplaces. MPs’ email addresses were associated with 2,110 breaches, with the average MP experiencing 4.7 breaches.
  2. European Parliament: Nearly half (44%) of EU MEPs' email addresses were found on the dark web, with 309 breached out of 705 searched. The breaches included 161 passwords in plaintext.
  3. French Politicians: French deputies and senators performed the best in terms of security, with only 18% of emails exposed on the dark web. However, French senators were more vulnerable (33%) compared to deputies (9%). One French politician had 137 breaches, the highest among all individuals studied.
  4. US Political Staffers: Of the 16,543 US political staffers’ email addresses examined, 20% (3,191) were exposed, along with 2,975 passwords, including 1,848 in plaintext.

The leaks were not due to direct hacks of government systems but rather due to politicians and staffers using their official email addresses to register on third-party websites, which were later breached. These websites included services like LinkedIn, Adobe, Dropbox, and even dating platforms.

Exposed Data Types:

  • Names
  • Email addresses
  • Dates of birth
  • Home addresses
  • Passwords (including plaintext)
  • Social media account links

The exposure of this data, especially plaintext passwords, presents a major cybersecurity risk. If individuals reuse these exposed passwords for their official government accounts, their official email systems could be at risk, potentially leading to severe national security issues.

 

Proton warns that data of thousands politicians leaked on the dark web