Cybersafetyconnections June 15th, 2025, vol#223 

  • From konbriefing there was a cyberattack on Mecklenburg-Western Pomerania State police smartphones in Germany. 
  • The police were unable to use the smartphones for Vehicle and  identity verification searches. 
  • Hackers may have attempted to hack servers for the police smartphone. 
  • No cybercriminal has claimed responsibility for the cyberattack. 
  • How is how  Mecklenburg-Western Pomerania State Police mitigated loss from the cyberattack 

What happened? 

PictureServer Computing 

According to MV there was an attempted cyber intrusion targeting the mobile devices utilized by the Mecklenburg-Western Pomerania State Police. 

Who was impacted? 

LAG   Mecklenburg-Western 

The cyberattack affected the Mecklenburg-Western Pomerania State Police (mPol) and the commuters whose vehicle ownership and identity documents needs to be verified speedily using the smart phone.  

Due to the attempted cyberattack, the smart phones could only be used for voice Communcation. The vehicle plate numbers were transmitted via slower Radio communication due to the attempted cyberattack. 

Why did this happen? 

The cyberattack targeted the servers controlling the mPol smart phones and we have not been provided information as to the reason for this cyberattack. 

We can assume that the attempted cyberattack maybe due to poor cybersecurity posture. 

Which cybercriminal group claimed responsibility for the attack? 

PictureHacker Stock Art Boing Boing 

No cybercriminal has claimed responsibility for the attack. 

Here is how the Mecklenburg-Western Pomerania State Police mitigated loss from the cyberattack. 

OWASP Threat and Safeguard Matrix 

Comprehensive investigations and analyses were commenced on the computer servers that govern these mobile phones and safeguard them against such attacks.  

  • Consequently, the mobile police (mPol) devices were temporarily limited in functionality for police officers on patrol duty.  
  • During the same period, officers were required to revert to traditional inquiry methods for information retrieval to check on vehicle ownership and verification of identity documents. 
  • The information to be verified was sent via radio communication by mPol and the searches were carried out using computers and information communicated back to mPol through radio communication. 
  • The State Commissioner for Data Protection and Freedom of Information of Mecklenburg-Western Pomerania was also  notified of these developments, and an investigation had been initiated accordingly. 

COpilot provided further tips on mitigating loss from the attempted cyberattack. 

The Mecklenburg-Western Pomerania State Police can take several steps to mitigate losses from the recent cyberattack on their smartphone systems: 

Immediate Response Measures 

  • Isolate Affected Systems: Disconnect compromised smartphones from the network to prevent further intrusion. 
  • Switch to Secure Communication Channels: Since mobile devices are limited to voice communication, officers should rely on encrypted radio transmissions for sensitive data. 
  • Investigate the Breach: Conduct forensic analysis to determine the attack vector and whether any data was compromised. 

Long-Term Cybersecurity Enhancements 

  • Strengthen Server Security: Implement multi-layered authentication and encryption for police smartphone servers. 
  • Regular Security Audits: Conduct frequent penetration testing to identify vulnerabilities before attackers do. 
  • Improve Incident Response Plans: Establish clear protocols for handling cyberattacks, including backup communication methods. 
  • Enhance Employee Training: Ensure officers and staff are aware of cybersecurity best practices to prevent phishing and unauthorized access. 

Restoring Operational Efficiency 

  • Deploy Alternative Verification Methods: Since vehicle plate verification is disrupted, temporary manual checks or offline databases can be used. 
  • Upgrade Mobile Security Infrastructure: Invest in hardened mobile devices with built-in security features to resist future attacks. 

Subscribe to get the latest post.