By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
In both cases, attackers attempted to access the email accounts of MPs by trying to crack their passwords using an automated trial-and-error process.
Holyrood officials said no email accounts had been compromised, but MPs have been advised to strengthen their passwords after many were found to be using weak ones, reports The Guardian.
In the Westminster attack, officials said “significantly fewer” than 90 of the 9,000 accounts on the parliamentary network had been compromised as a result of the use of weak passwords that did not conform to guidance issued by the Parliamentary Digital Service.
Holyrood staff members were reportedly warned about the cyber attack in an internal email by their chief executive, Paul Grice, who warned of potential email account lockouts or failed log-ins.
“The parliament’s monitoring systems have identified that we are currently the subject of a brute-force cyber attack from external sources,” said Grice.
“The parliament’s robust cyber security measures identified this attack at an early stage and the additional security measures which we have in readiness for such situations have already been invoked. Our IT systems remain fully operational.”
Although the identity of the Westminster attackers has not yet been confirmed, the hackers are believed to be aligned with Russia or North Korea.
Russian-sponsored hackers appear to be the more likely culprits in the light of the fact that Russian hacking group APT28 or FancyBear has been linked with cyber attacks on the German parliament, the White House, Nato, the US Democratic National Committee, and the election campaign of French presidential candidate Emmanuel Macron.
Several other countries, including Ukraine, Norway, the Czech Republic, Bulgaria and Italy, have also reported recent cyber attacks targeting digital infrastructure that are believed to have been the work of Russian hacking groups.
The Westminster attack came just days after it emerged that the passwords and email addresses of UK MPs, parliamentary staff, diplomats and senior police officers had been sold, bartered and then made available for free on Russian-speaking hacking forums.
The National Cyber Security Centre confirmed that its digital security advice had been reissued to government departments following the discovery.