Anatomy of a Breach

Anatomy of a Breach: UK Parliament — 90 Email Accounts Compromised Through Weak Passwords

> series: anatomy_of_a_breach —— part: 103 —— target: uk_parliament —— accounts: ~90 —— method: brute_force_weak_passwords<span class="cursor-blink">_</span>_

Hedgehog Security 31 July 2017 11 min read

90 parliamentary email accounts. Compromised through weak passwords. Weeks after WannaCry.

On 23 June 2017, the UK Parliamentary Digital Service disclosed that it was dealing with a sustained cyber attack targeting parliamentary email accounts. Remote email access was temporarily disabled for security reasons, affecting MPs, peers, and their staff. Approximately 90 accounts — less than 1% of the roughly 9,000 parliamentary email users — were compromised through the attack, which used brute-force password guessing and credential-stuffing techniques.

The attack came just six weeks after WannaCry had devastated the NHS and amid heightened concerns about foreign interference in democratic processes following the DNC hack. Reports suggested the attack may have been linked to Iran, though attribution was not confirmed. The 90 compromised accounts were those using weak passwords that had not been protected by multi-factor authentication — the same fundamental failure documented in breaches throughout this series.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Weak passwords. No MFA. On the UK Parliament's email system.

The parliamentary email system did not mandate MFA at the time of the attack — and the 90 compromised accounts were protected only by passwords that were weak enough to be guessed or matched from breach databases. This is the credential-stuffing pattern documented in Breach #091: passwords compromised in previous breaches (LinkedIn, Myspace, etc.) tested against new targets — succeeding wherever users had reused the same password.

Weak Passwords on Government Systems
Approximately 1% of parliamentary users had passwords weak enough to be compromised through brute force or credential stuffing. Even a 1% failure rate, in an organisation handling sensitive government communications, represents an unacceptable risk. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA as an auto-fail criterion — the control that would have prevented all 90 compromises.
Democratic Processes Under Threat
Following the <a href="/blog/anatomy-of-a-breach-dnc-hack">DNC hack</a> (2016) and the <a href="/blog/anatomy-of-a-breach-philippines-comelec">Philippines COMELEC breach</a> (2016), the UK Parliament attack confirmed that democratic institutions worldwide are cyber targets. For <a href="/blog/sector-under-the-microscope-local-government">UK local government</a> bodies, the lesson extends to council email systems, electoral infrastructure, and citizen-facing services.
MFA Was Not Mandatory
The parliamentary email system offered but did not mandate MFA. The 90 compromised accounts had not opted in. Post-attack, MFA was made mandatory. The lesson applies to every organisation: MFA must be enforced, not offered. <a href="/cyber-essentials">Cyber Essentials</a> mandates enforcement.
Remote Access Disabled as Response
Disabling remote email access was a necessary containment step but disrupted parliamentary operations. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides real-time detection that enables targeted containment — disabling specific compromised accounts rather than shutting down remote access entirely. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response that balances security with operational continuity.

MFA must be mandatory. Not optional. Not recommended. Mandatory.

The UK Parliament attack reinforced — in the most politically visible way possible — that MFA must be mandatory for all users, not an opt-in feature. The 90 compromised accounts were the ones that had not enabled MFA. If MFA had been enforced for all parliamentary users, the attack would have affected zero accounts instead of 90. Cyber Essentials Danzell makes MFA an auto-fail criterion for exactly this reason.

Our penetration testing includes credential-testing scenarios and MFA bypass assessment. Social engineering assessments test staff resilience to phishing. SOC in a Box monitors for brute-force and credential-stuffing patterns. And UK Cyber Defence provides incident response when authentication attacks are detected.


The UK Parliament was breached through weak passwords. Is MFA mandatory across your organisation?

<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA. Our <a href="/penetration-testing">penetration testing</a> validates enforcement. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects credential attacks.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles