all-in-one privacy solution":["Proton Unlimited ist eine All-in-One-Datenschutzlösung"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Keine Werbung. Privatsphäre als Standard."],"People before profits":["Menschen sind uns wichtiger als Gewinne"],"Security through transparency":["Sicherheit durch Transparenz"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Die besten Proton Mail-Angebote zum ${ BLACK_FRIDAY }"],"The world’s only community- supported email service":["Der weltweit einzige von der Community unterstützte E-Mail-Dienst"]},"specialoffer:limited":{"${ hours } hour":["${ hours } Stunde","${ hours } Stunden"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Nur noch ${ hoursLeft }, ${ minutesLeft } und ${ secondsLeft }"],"${ minutes } minute":["${ minutes } Minute","${ minutes } Minuten"],"${ seconds } second":["${ seconds } Sekunde","${ seconds } Sekunden"],"Limited time offer":["Zeitlich befristetes Angebot"]},"specialoffer:listitem":{"Create multiple addresses":["Erstelle mehrere Adressen"],"Hide-my-email aliases":["Hide-my-email-Aliase"],"Quickly unsubscribe from newsletters":["Newsletter schnell abbestellen"],"Use your own domain name":["Verwende deine eigene Domain"]},"specialoffer:logos":{"As featured in":["Vorgestellt in"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Nutze einen verschlüsselte E-Mail-Dienst, der deine Privatsphäre schützt"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Black Friday-Angebot – Bis zu 40 % Rabatt"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Erhalte an diesem Black Friday bis zu 40 % Rabatt auf Proton Mail-Abonnements. Mache tolle Schnäppchen bei unseren sicheren, Ende-zu-Ende-verschlüsselten E-Mail-Abonnements."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail-Black-Friday-Angebot | Bis zu 40 % Rabatt auf sichere E-Mails"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Zum Preis von ${ TOTAL_SUM } im ersten Jahr"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Zum Preis von ${ TOTAL_SUM } in den ersten zwei Jahren"],"30-day money-back guarantee":["30-tägige Geld-zurück-Garantie"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Zum Preis von ${ TOTAL_SUM } in den ersten zwei Jahren"],"Billed at ${ TOTAL_SUM } for the first year":["Zum Preis von ${ TOTAL_SUM } im ersten Jahr"],"You save ${ SAVE_SUM }":["Du sparst ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["− ${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Ich liebe mein ProtonMail"],"My favorite email service":["Mein Lieblings-E-Mail-Dienst"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Danke Proton, dass du uns alle im komplizierten Internet-Universum beschützt."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Du bekommst, wofür du bezahlst. Wenn du nichts bezahlst, wirst du bei der Nutzung von Big Tech ausgenutzt. Ich habe Gmail aufgegeben und bin zu @ProtonMail gewechselt"]},"specialoffer:time":{"Days":["Tage"],"Hours":["Stunden"],"Min":["Min."]},"specialoffer:title":{"And much more":["Und vieles mehr"],"Safe from trackers":["Sicher vor Trackern"],"Stay organized":["Ordnung halten"],"Black Friday email deals":["E-Mail-Angebote zum Black Friday"],"Don’t just take our word for it":["Verlasse dich nicht nur auf unser Wort"],"Make your inbox yours":["Passe deinen Posteingang an"],"Our story":["Unsere Geschichte"],"Transfer your data from Google in one click":["Übertrage deine Daten von Google mit einem Klick"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Greife auf blockierte Inhalte zu und surfe privat. Umfasst ${ TOTAL_VPN_SERVERS } Server in über ${ TOTAL_VPN_COUNTRIES } Ländern, die Verbindung \nvon bis zu 10 Geräten, weltweite Streaming-Dienste, Malware- und Werbeblocker und mehr."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Teile deinen Kalender ganz einfach mit Verwandten, Freunden oder Kollegen und rufe externe Kalender auf."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Beinhaltet Unterstützung für eine eigene E-Mail-Domain, 10 E-Mail-Adressen, 10 „hide-my-email“-Aliasse, Kalenderfreigabe und mehr."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Beinhaltet Unterstützung für 3 benutzerdefinierte E-Mail-Domänen, 15 E-Mail-Adressen, unbegrenzte „hide-my-email“-Aliase, Kalenderfreigabe und mehr."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Verwalte bis zu 25 Kalender, Ende zu Ende verschlüsselte mobile Apps, 1-Klick-Kalenderimporte von Google und vieles mehr."]},"Status banner":{"Learn more":["Mehr erfahren"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Bitte beachte, dass wir im Moment Probleme mit dem Dienst ${ issues[0] } haben."],"We are experiencing issues with one or more services at the moment.":["Im Moment gibt es Probleme mit einem oder mehreren Diensten."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Im Moment gibt es Probleme mit dem Proton VPN-Dienst"],"Learn more":["Mehr erfahren"]},"steps":{"Step":["Schritt"]},"suggestions":{"Suggestions":["Vorschläge"]},"Support":{"Sub category":["Unterkategorie","Unterkategorien"]},"Support article":{"${ readingTime } min":["${ readingTime } Min.","${ readingTime } Min."],"Category":["Kategorie","Kategorien"],"Didn’t find what you were looking for?":["Hast du nicht gefunden, wonach du gesucht hast?"],"General contact":["Allgemeiner Kontakt"],"Get help":["Hilfe erhalten"],"Legal contact":["Kontakt für Rechtliches"],"Media contact":["Kontakt für Medien"],"Partnerships contact":["Kontakt für Partnerschaften"],"Reading":["Lesen"]},"Support Form Platform option":{"VPN for Android TV":["VPN für Android TV"],"VPN for Apple TV":["VPN für Apple TV"],"VPN for Chromebook":["VPN für Chromebook"]},"Support troubleshooting":{"App version":["App-Version"],"Browser":["Browser"],"Check if this helps":["Schau, ob das hilft."],"Choose a product":["Produkt auswählen"],"Did this solve your issue?":["Hat dies dein Problem gelöst?"],"Faster assistance is just a few clicks away":["Schnellere Hilfe ist nur ein paar Klicks entfernt"],"How can we help?":["Wie können wir dir helfen?"],"No, contact support":["Nein, Support kontaktieren"],"Please fill out one field after another":["Bitte fülle ein Feld nach dem anderen aus"],"Please make your selections":["Bitte triff deine Auswahl"],"Proton account":["Proton-Konto"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Danke für dein Feedback"],"What can we help with?":["Wobei können wir dir helfen?"],"Yes":["Ja"]},"support_modal_search_query":{"Search query":["Anfrage suchen"]},"support_search_button":{"Search":["Suchen"]},"support_search_i_am_looking_for":{"I'm looking for":["Ich suche"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Damit das Problem schneller gelöst werden kann, melde es bitte über die Bridge-App: Help > Report a problem (Hilfe > Problem melden)."],"Information":["Informationen"]},"SupportForm:option":{"Account Security":["Kontosicherheit"],"Contacts":["Kontakte"],"Custom email domain":["Benutzerdefinierte E-Mail-Domain"],"Email delivery and Spam":["E-Mail-Zustellung und Spam"],"Encryption":["Verschlüsselung"],"Login and password":["Anmeldung und Passwort"],"Merge aliases and accounts":["Zusammenführung von Aliassen und Konten"],"Migrate to Proton":["Migration zu Proton"],"Notifications":["Benachrichtigungen"],"Other":["Sonstiges"],"Plans and billing":["Abonnements und Abrechnung"],"Proton for Business":["Proton for Business"],"Sign up":["Registrierung"],"Storage":["Speicher"],"Users, addresses, and identities":["Benutzer, Adressen und Identitäten"]},"SupportForm:optionIntro":{"Select a topic":["Thema auswählen"]},"Testimonial":{"Awards":["Auszeichnungen"],"Customers":["Kunden"],"Featured":["Empfohlen"],"Go to testimonial source":["Zur Referenzquelle wechseln"],"Open source of award":["Quelle der Auszeichnung öffnen"],"Open source of quote":["Quelle des Zitats öffnen"],"Reviews":["Bewertungen"],"Videos":["Videos"],"Watch on TikTok":["Auf TikTok ansehen"],"Watch on YouTube":["Auf YouTube ansehen"]},"TestimonialCategory":{"Awards":["Auszeichnungen"],"Customers":["Kunden"],"Featured":["Empfohlen"],"Media":["Medien"],"Reviews":["Bewertungen"],"Videos":["Videos"]},"Text":{"If you need help, check out our ${ supportLink }.":["Hilfe erhältst du in unserem ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Die von dir gesuchte Seite wurde möglicherweise entfernt, oder es könnte sich um einen alten Link handeln."],"Your question may already have an answer in our knowledge base:":["Vielleicht gibt es bereits eine Antwort auf deine Frage in unserer Wissensdatenbank:"]},"Title":{"On this page":["Auf dieser Seite"],"Related articles":["Verwandte Artikel"],"Share ${ thisPage }":["${ thisPage } teilen"],"Switch to Proton Pass - Contact us":["Zu Proton Pass wechseln – Kontaktiere uns"],"Thank you!":["Vielen Dank!"],"this page":["diese Seite"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Greife auf blockierte Inhalte zu und surfe privat. Enthält über ${ TOTAL_VPN_SERVERS } Server in mehr als ${ TOTAL_VPN_COUNTRIES } Ländern, höchste VPN-Geschwindigkeiten, ${ TOTAL_VPN_CONNECTIONS } VPN-Verbindungen, weltweite Streaming-Dienste, Malware- und Werbeblocker und mehr."]},"vpn_servers":{"Get Proton VPN Plus":["Proton VPN Plus holen"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Hol dir Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Bitcoin-Leitfaden"],"Proton Wallet news":["Proton Wallet-Neuigkeiten"],"Proton Wallet support":["Proton Wallet-Support"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Umfasst alles, was in Proton Unlimited enthalten ist und"],"Limited availability":["Begrenzte Verfügbarkeit"],"The easiest way to securely own, send, and receive Bitcoin":["Der einfachste Weg, Bitcoin sicher aufzubewahren, zu senden und zu empfangen"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Proton Wallet entdecken"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Bewahre Bitcoins auf und überweise sie auf private Weise mit einer verschlüsselten, selbstverwahrenden Wallet."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Erfahre mehr über Bitcoin, das Wertnetzwerk des Internets."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Stelle sicher, dass du immer die Kontrolle über deine Bitcoins behältst."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["Die verschlüsselte Open-Source-Wallet, die dir die Kontrolle gibt."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
Relatively few Spanish and Italian politicians’ details exposed online | Proton
Far fewer Italian and Spanish politicians have had personal details leaked onto the dark web than their European counterparts. We found the official emails of 91 out of 609 Italian politicians (nearly 15%) and only 39 out of 615 Spanish politicians (roughly 6%) on dark web marketplaces where such information is illegally bought and sold.
We worked with Constella Intelligence(neues Fenster) on this investigation, which is part of our ongoing series examining the cybersecurity practices of lawmakers worldwide. Our original report found that roughly 44% of EU MEPs, 18% of French deputies and senators, 68% of UK MPs, and 20% of US political staffers had their email addresses and other sensitive details exposed on the dark web, all of which surpass the numbers out of Italy and Spain.
The email addresses of Italian and Spanish politicians are publicly available, so the fact that they’re being sold on the dark web isn’t a security failure, nor does it suggest that the Italian or Spanish parliaments were hacked. The email addresses and other sensitive data we found were typically leaked in a breach by common service providers, like Adobe, Dailymotion, Dropbox, LinkedIn, or news services (or, in some cases, dating websites).
The fact that politicians used their official email for these accounts is where the security failure occurred, as it makes it easy for attackers to identify the accounts of high-value targets. Additionally, 197 passwords associated with Italian and Spanish politicians were exposed in plaintext. If any of these politicians reused an exposed password to secure an official account, it could also be at risk.
We explore the Italian and Spanish leaks in greater detail below and explain what their potential ramifications could be.
Politicians’ data exposed
We found multiple types of sensitive information linked to politicians’ emails during this investigation, including dates of birth, residence addresses, and social media accounts. Attackers can use this information to create convincing phishing attacks targeting the person whose data leaked or their staffers and colleagues.
Number of email addresses searched
Number of breached email addresses
Number of passwords exposed
Number of passwords exposed in plaintext
Italian Parliament
609
91
195
188
Spanish Parliament
615
39
14
9
Italian politicians’ email addresses are safe, passwords are not
Italian politicians had their emails exposed a total of 402 times on the dark web (this includes email addresses that appear multiple times). Meanwhile, British MPs had their email addresses exposed a total of 2,110 times — over five times more — even though the British House of Commons has roughly the same number of members as the Italian Parliament.
As in our previous investigation, we can see a disparity in the number of breaches between the two houses of the Italian Parliament. We found at least an email address for 73 of the 400 members of the Assembly (18.2%) and only 18 of the 209 members of the Senate (8.6%). Interestingly, this is a reversal of the trend we found with the French Parliament, where 8.8% of the National Assembly had at least their email address exposed compared to 33% of the Senate.
Also, Italian politicians have the most passwords exposed in plaintext in Europe (188) despite only having 195 passwords exposed overall and the fewest members of any parliament. This suggests that at least a few Italian politicians use dangerously outdated or untrustworthy websites.
These exposed email addresses and passwords are important because they are a vulnerability that attackers could exploit. The internet has become a new front in geopolitics, and Italian politicians and government agencies have been targeted repeatedly, particularly by Russian state-backed actors. In May 2023, the pro-Russian group Killnet claimed responsibility for DDoS attacks(neues Fenster) on the websites of Italy’s parliament, military, National Institute of Health, and other government agencies. In August 2023, the pro-Russian group NoName057(16) committed DDoS attacks(neues Fenster) on many of Italy’s major banks. In May 2024, NoName057(16) again took credit for attacks(neues Fenster) on the websites of PM Giorgia Meloni, the Ministry of Infrastructure, and the Ministry of Enterprise.
These attacks show that Russian actors will be interested in testing and embarrassing Italian officials as long as they offer support to Ukraine.
Spanish politicians have the fewest leaks so far
Only 6.3% of Spanish lawmakers had their details exposed on the dark web, the lowest percentage of all the politicians we’ve looked at. Only 29 of the 350 members of the Spanish Congress and a minuscule 10 of the 265 members of the Senate had their details exposed. Even more impressive, we only found nine passwords exposed in plaintext.
We reached out to a Spanish cybersecurity expert to see if there was an explanation for Spain’s outlier performance. Ainoa Guillén Gonzalez, who is based in Madrid and the co-founder of SyndiK8, a cybercrime and threat intelligence research firm, was somewhat surprised by the results, but thinks Spanish politicians learned to prioritize their cybersecurity after observing what happened to labor and social movements that were organized online. “In the early 2010s in Spain, many strikes and protests were organized using Twitter, using social media, using email. Spanish politicians saw this and they also saw how the police and companies monitored social media in an attempt to control these movements. This taught the politicians very quickly the importance of good cybersecurity. And then later on, the Pegasus hacking scandal(neues Fenster) reinforced these lessons all over again.”
In 2022, cybersecurity experts discovered the phones of 63 people involved in the Catalan independence movement had been infected with Pegasus spyware(neues Fenster) (and two individuals had been targeted), including the then-regional Catalan president, Pere Aragonès. A short while later, the Spanish government discovered the prime minister and defense minister(neues Fenster) also had Pegasus malware on their devices. It later came to light that this surveillance had gone on for years, between 2017 and 2020, and at least 18 of the Catalans had been surveilled with judicial approval. As a result, the Spanish intelligence chief resigned(neues Fenster). In 2023, the investigation was closed(neues Fenster) due to Israel’s unwillingness to cooperate, but in 2024, Spain’s highest court ordered prosecutors to reopen the case(neues Fenster) after receiving new information from French officials (French President Emmanuel Macron was allegedly also targeted).
It’s hard to imagine these events didn’t have a massive impact on Spanish politician’s attitudes toward cybersecurity. However, French politicians likely saw the same kind of surveillance of protests, and they had far more information exposed. In the US, the hack of John Podesta’s emails(neues Fenster), Hillary Clinton’s campaign manager during the 2016 presidential election, is arguably the most famous hack of recent memory, and 20% of US staffers’ email addresses still appeared on the dark web.
We should all be concerned about politicians’ breaches
Even if none of the accounts linked to the breaches listed above give attackers access to state secrets, each one is still a real problem that policymakers should take seriously. These accounts could reveal politicians’ private communications or other personal information, like schedules or social networks, that attackers could use for phishing attacks or blackmail.
If a politician reused the same password on multiple accounts and their password was exposed in a breach (and failed to use two-factor authentication(neues Fenster)), that could potentially put confidential information at risk.
How we can all be more secure online
Cybersecurity is a constantly shifting battle. New defenses lead to new attacks that require experts to develop new defenses again. Still, there are simple steps we can all take to be more safe online. In this case, the first step is the most obvious — No one should use their professional email to create online accounts, especially government officials who have access to secret information. Breaches happen with frightening regularity, and if you use a government email, attackers instantly know they have information on a high-value target.
Here are some straightforward steps that everyone — but especially politicians and other high-profile or public figures — should take to strengthen their account security:
Use email aliases: Email aliases mask the true owner of an account, preventing your real email from being exposed in a breach. You can quickly delete aliases that have been compromised without affecting your primary email or other aliases.
Use a password manager: While a password manager can’t improve the security of the services you sign up for, it can ensure that each of your accounts has a strong, random, and unique password. A good password manager also simplifies password sharing and management, reducing the risk of exposing passwords by writing them down.
Use dark web monitoring services: Even if you follow all cybersecurity best practices, your information can still be exposed through a company’s data breach. Dark web monitoring alerts you if your information appears online, allowing you to update your email (or better yet, your email alias) and password before attackers can exploit it.
Proton Pass(neues Fenster) can solve all of these problems. If you choose our Proton Pass Plus plan, you get:
Take control of your account security (and, if you’re a parliamentarian, help avert a national scandal) by signing up for a Proton Pass Plus plan today.