Austria’s Interior Ministry Hit by Sophisticated State-Level Cyberattack Affecting Emails

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Austrian government officials disclosed on August 30, 2025, that a cyberattack uncovered several weeks ago targeted the Austrian Interior Ministry's (BMI) critical email infrastructure, partially compromising approximately 100 government accounts in a highly professional operation.

Breach Scope and Technical Assessment

Interior Minister Gerhard Karner and State Secretary Jörg Leichtfried emphasized the attack was "highly targeted and highly professional," stating the methodology demonstrated patterns consistent with state-sponsored hacking operations, according to reports. 

The email server breach affected approximately 100 accounts from the BMI's total pool of roughly 60,000 email addresses. 

The ministry's IT operations unit identified irregularities in office IT systems during routine monitoring, subsequently confirming the breach through comprehensive forensic analysis.

Response Protocol and Containment Measures

BMI officials implemented immediate cybersecurity measures following breach confirmation. The response framework included systematic isolation of compromised accounts, direct notification of affected personnel, and engagement of external cybersecurity specialists.

Operational continuity remained intact throughout the incident, with the ministry confirming that police information systems, registers, databases, and citizens' personal data were not compromised. 

However, external email communications faced temporary restrictions, disrupting services including police press release distribution.

Attribution Analysis and Security Implications

While investigators have not formally attributed the attack to specific threat actors, the sophisticated nature of the operation suggests involvement of nation-state or semi-state entities. 

The incident follows similar high-profile government breaches, including a 2020 attack on Austria's Foreign Ministry that required weeks to contain.

News of the breach of Austrian government email accounts comes after cyber agencies warned of a global espionage activity cluster partially overlapping with Salt Typhoon and other APTs. In other news, TechNadu reported on TAG-144 (Blind Eagle) targeting South American governments in a sustained campaign in August.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: