all-in-one privacy solution":["Proton Unlimited tam kapsamlı bir gizlilik çözümüdür"],"Black Friday":["Muhteşem Cuma"],"No ads. Privacy by default.":["Reklamsız. Privacy by default."],"People before profits":["İnsanlar paradan önce gelir"],"Security through transparency":["Şeffaflık ile güvenlik"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["En iyi Proton Mail ${ BLACK_FRIDAY } fırsatları"],"The world’s only community- supported email service":["Dünyanın tek topluluk tarafından desteklenen e-posta hizmeti"]},"specialoffer:limited":{"${ hours } hour":["${ hours } saat","${ hours } saat"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["${ hoursLeft } - ${ minutesLeft } - ${ secondsLeft } kaldı"],"${ minutes } minute":["${ minutes } dakika","${ minutes } dakika"],"${ seconds } second":["${ seconds } saniye","${ seconds } saniye"],"Limited time offer":["Sınırlı süreli teklif"]},"specialoffer:listitem":{"Create multiple addresses":["Birden adres oluşturun"],"Hide-my-email aliases":["Hide-my-email takma adları (e-posta adresi)"],"Quickly unsubscribe from newsletters":["Bülten aboneliğinden hızlı ayrılma"],"Use your own domain name":["Kendi etki alanınızı kullanın"]},"specialoffer:logos":{"As featured in":["Belirtildiği gibi"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Gizliliğinizi koruyan bir şifreli e-posta edinin"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Muhteşem Cuma İndirimleri - %40'a varan indirimler"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Bu Muhteşem Cuma'da Proton Mail aboneliklerinde %40'a varan indirimlerden faydalanın. Uçtan uca şifrelenmiş e-posta tarifelerimiz için muhteşem fırsatlardan yararlanın."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail Muhteşem Cuma İndirimleri - Güvenli e-postada %40'a varan indirimler"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*ilk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"30-day money-back guarantee":["30 günlük para iade garantisi"],"Billed at ${ TOTAL_SUM } for the first 2 years":["İlk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"Billed at ${ TOTAL_SUM } for the first year":["İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"You save ${ SAVE_SUM }":["${ SAVE_SUM } tasarruf ediyorsunuz"]},"specialoffer:off":{"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["ProtonMail'imi seviyorum"],"My favorite email service":["En sevdiğim e-posta hizmeti"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Hepimizi bu karışık internet evreninde güvende tuttuğun için teşekkürler Proton."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Ödediğinizin karşılığını alırsınız. Big Tech şirketleri söz konusu olduğunda, hiçbir şey ödememiyorsanız sizi kullanırlar. Gmail kullanmayı bıraktım ve @ProtonMail hizmetine geçtim"]},"specialoffer:time":{"Days":["Gün"],"Hours":["Saat"],"Min":["Dakika"]},"specialoffer:title":{"And much more":["Ve daha fazlası"],"Safe from trackers":["İzleyicilerdengüvende olun"],"Stay organized":["Düzenli kalın"],"Black Friday email deals":["Muhteşem Cuma e-posta fırsatları"],"Don’t just take our word for it":["Sırf bizden duymuş olmayın"],"Make your inbox yours":["Gelen kutunuzu kendinize ait kılın"],"Our story":["Öykümüz"],"Transfer your data from Google in one click":["Google'dan bilgilerinizi tek tıkla aktarın"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_VPN_COUNTRIES } üzeri ülkede ${ TOTAL_VPN_SERVERS } üzerinde sunucu, 10 aygıta kadar bağlantı, dünya çapındaki yayın hizmetlerine erişim, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Takviminizi bir bağlantı aracılığıyla ailenizle, arkadaşlarınızla veya iş arkadaşlarınızla paylaşın ve başka takvimleri görüntüleyin."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["1 özel e-posta etki alanı, 10 e-posta adresi, 10 hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["3 özel e-posta etki alanı, 15 e-posta adresi, sınırsız hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["25'ye kadar takvim yönetin, mobil uygulamalar, uçtan uca şifreleme ile koruma, Google'dan tek tıkla aktarma ve daha fazlası."]},"Status banner":{"Learn more":["Ayrıntılı bilgi alın"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Şu anda ${ issues[0] } hizmeti ile ilgili sorun yaşamaktayız, bilginize."],"We are experiencing issues with one or more services at the moment.":["Şu anda bir veya daha fazla hizmet ile ilgili sorun yaşamaktayız."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Şu anda Proton VPN hizmetiyle ilgili sorunlar yaşıyoruz"],"Learn more":["Ayrıntılı bilgi alın"]},"steps":{"Step":["Adım"]},"suggestions":{"Suggestions":["Öneriler"]},"Support":{"Sub category":["Alt kategori","Alt kategori"]},"Support article":{"${ readingTime } min":["${ readingTime } dakikalık","${ readingTime } dakikalık"],"Category":["Kategori","Kategori"],"Didn’t find what you were looking for?":["Aradığınızı bulamadınız mı?"],"General contact":["Genel iletişim"],"Get help":["Yardım alın"],"Legal contact":["Hukuki iletişim"],"Media contact":["Medya iletişimi"],"Partnerships contact":["Ortaklık iletişimi"],"Reading":["Okuma süresi"]},"Support Form Platform option":{"VPN for Android TV":["Android TV için VPN"],"VPN for Apple TV":["VPN Apple TV uygulaması"],"VPN for Chromebook":["Chromebook için VPN"]},"Support troubleshooting":{"App version":["Uygulama sürümü"],"Browser":["Tarayıcı"],"Check if this helps":["Yardımcı olabilecek bu cevaba bir göz atın"],"Choose a product":["Bir ürün seçin"],"Did this solve your issue?":["Bu, sorununuzu çözdü mü?"],"Faster assistance is just a few clicks away":["Daha hızlı yardım birkaç tık uzağınızda"],"How can we help?":["Nasıl yardımcı olabiliriz?"],"No, contact support":["Hayır, destekle iletişime geçin"],"Please fill out one field after another":["Lütfen alanları tek tek sırayla doldurun"],"Please make your selections":["Lütfen seçimlerinizi yapın"],"Proton account":["Proton hesabı"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Geri bildiriminiz için teşekkürler"],"What can we help with?":["Ne konuda yardımcı olabiliriz?"],"Yes":["Evet"]},"support_modal_search_query":{"Search query":["Sorgu ara"]},"support_search_button":{"Search":["Ara"]},"support_search_i_am_looking_for":{"I'm looking for":["Şunu arıyorum: -"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Daha hızlı bir çözüm için, lütfen sorunu Bridge uygulamasının Yardım > Bir sorun bildir kısmından bildiririn."],"Information":["Bilgi"]},"SupportForm:option":{"Account Security":["Hesap Güvenliği"],"Contacts":["Kişiler"],"Custom email domain":["Özel e-posta etki alanı"],"Email delivery and Spam":["E-posta iletimi ve istenmeyen e-postalar"],"Encryption":["Şifreleme"],"Login and password":["Oturum ve şifre"],"Merge aliases and accounts":["Takma adları (e-posta adresi) ve hesapları birleştir"],"Migrate to Proton":["Proton üzerine aktarım"],"Notifications":["Bildirimler"],"Other":["Diğer"],"Plans and billing":["Tarifeler ve faturalandırma"],"Proton for Business":["Proton for Business"],"Sign up":["Hesap açma"],"Storage":["Depolama"],"Users, addresses, and identities":["Kullanıcılar, adresler ve kimlikler"]},"SupportForm:optionIntro":{"Select a topic":["Bir konu seç"]},"Testimonial":{"Awards":["Ödüller"],"Customers":["Müşteriler"],"Featured":["Öne Çıkanlar"],"Go to testimonial source":["Müşteri görüşünün kaynağına git"],"Open source of award":["Ödülün kaynağını aç"],"Open source of quote":["Alıntının kaynağını aç"],"Reviews":["İncelemeler"],"Videos":["Videolar"],"Watch on TikTok":["TikTok'ta izle"],"Watch on YouTube":["YouTube'da izle"]},"TestimonialCategory":{"Awards":["Ödüller"],"Customers":["Müşteriler"],"Featured":["Öne Çıkanlar"],"Media":["Medya"],"Reviews":["İncelemeler"],"Videos":["Videolar"]},"Text":{"If you need help, check out our ${ supportLink }.":["Yardıma ihtiyacınız varsa ${ supportLink } ziyaret edebilirsiniz."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Aradığınız sayfa kaldırılmış veya eski bir\nbağlantı olabilir."],"Your question may already have an answer in our knowledge base:":["Sorunuz halihazırda bilgi tabanımızda cevaplanmış olabilir:"]},"Title":{"On this page":["Bu sayfada"],"Related articles":["İlgili makaleler"],"Share ${ thisPage }":["${ thisPage } paylaşın"],"Switch to Proton Pass - Contact us":["Proton Pass hizmetine geçin - Bize ulaşın"],"Thank you!":["Teşekkürler!"],"this page":["Bu sayfayı"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_VPN_COUNTRIES } üzeri ülkede ${ TOTAL_VPN_SERVERS } üzerinde sunucu, en yüksek VPN hızını, ${ TOTAL_VPN_CONNECTIONS } VPN bağlantısı, dünya çapındaki yayın hizmetlerini, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."]},"vpn_servers":{"Get Proton VPN Plus":["Proton VPN Plus edinin"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Proton Wallet edinin"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Bitcoin rehberi"],"Proton Wallet news":["Proton Wallet haberleri"],"Proton Wallet support":["Proton Wallet desteği"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Proton Unlimited'daki her şey dahildir ve"],"Limited availability":["Sınırlı kullanılabilirlik"],"The easiest way to securely own, send, and receive Bitcoin":["Bitcoin'e güvenli bir şekilde sahip olmanın, göndermenin ve almanın en kolay yolu"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Proton Wallet'ı Keşfedin"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Şifrelenmiş bir kendi kendine saklama cüzdanıyla Bitcoin'inizi özel olarak saklayın ve işlem yapın."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["İnternetin değer ağı olan Bitcoin hakkında bilgi edinin."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Bitcoin’lerinizin her zaman kontrolünüzde olduğundan emin olun."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["Direksiyona sizi koyan şifrelenmiş, açık kaynaklı cüzdan."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
Danish, Dutch, Luxembourgish politicians have details leaked on dark web | Proton
In the latest installment of our investigation with Constella Intelligence(yeni pencere) into the cybersecurity risks politicians face, we found that 41% of Danish members of parliament have had their official email address exposed on the dark web, one of the highest percentages in the EU. We also looked at the Dutch and Luxembourgish parliaments, which had 18% and 16% of their members’ email addresses exposed, respectively.
The email addresses of Danish, Dutch, and Luxembourgish politicians are available publicly (this is how we found them), so the fact that we found them in dark marketplaces where info is illegally bought and sold isn’t, in itself, a security failure. We’re also not suggesting these parliaments suffered a cyberattack or that this information was stolen. In the vast majority of cases, these official email addresses ended up on the dark web as part of a data breach by a common service provider, like Adobe, Dailymotion, Dropbox, LinkedIn, or news services.
However, these politicians should never have used their official email addresses to create such an account. This makes it easy for attackers to quickly identify politicians’ accounts. Next, they can check if any passwords are associated with these email addresses. Between the Danish, Dutch, and Luxembourgish politicians we looked at, we found 139 passwords in plaintext. That’s potentially 139 compromised accounts — and it could be many more if any of these politicians reused exposed passwords elsewhere.
We explore the Danish, Dutch, and Luxembourgish leaks in greater detail below and explain why politicians must take their cybersecurity seriously.
Politicians’ data exposed
We found much more than just emails and passwords during this investigation. While we’re not sharing any identifying information for obvious reasons, sensitive information like dates of birth, residence addresses, and social media accounts were linked to these politicians’ email addresses. (We also informed every affected politician that they had sensitive data exposed on the internet before publishing this article.)
Attackers can easily buy this information and use it to create convincing phishing campaigns or social engineering attacks.
Number of email addresses searched
Number of breached email addresses
Number of passwords exposed
Number of passwords exposed in plaintext
Danish Parliament
179
74
93
69
Dutch Parliament
225
41
35
32
Luxembourgish Parliament
60
10
43
38
Over 40% of Danish politicians have email addresses leaked
At 41%, Danish politicians have one of the highest rates of email address breaches in Europe. The email addresses of 74 of the 179 members of the Danish parliament appear a total of 555 times on the dark web. One politician had their email address exposed in 25 separate breaches, along with eight passwords exposed in plaintext. This should be a major concern as Danish politicians and infrastructure have been the target of significant cyberattacks.
In June 2024, the Danish Center for Cyber Security(yeni pencere) raised the threat level for cyberattacks to “Medium”, or three out of five, specifying that this was largely due to the threats from Russia. This follows an attack in May 2023 where the Russian hacker group NoName057(16) took the Danish Parliament’s website offline(yeni pencere) with a DDoS attack. Immediately after this attack, another hacking group exploited a zero-day vulnerability in un-updated firewalls to attack 22 organizations that operate and oversee Denmark’s energy infrastructure(yeni pencere) in the largest cyberattack in Denmark’s history. The main suspect is Sandworm (also known as Voodoo Bear and Seashell Blizzard), a hacking group affiliated with Russia’s intelligence service that performed similar attacks on Ukraine’s energy infrastructure.
The Netherlands’ lower house of parliament has three times as many breaches as the upper house
While Dutch politicians had relatively few email addresses exposed on the dark web overall (18%), there is a major discrepancy between the lower house (Tweede Kamer) and the upper house (Eerste Kamer). We searched for all 150 Tweede Kamer members’ email addresses and found 36 of them, or 24%. Meanwhile, out of the 75 members of the Eerste Kamer, we found the official email addresses for only five, roughly 6.7%. It’s the second largest disparity between houses we’ve seen in our investigation — only France has a higher one. There, 8.8% of the National Assembly had their email address exposed compared to 33% of the Senate.
Luxembourg politicians have most passwords exposed per individual
Luxembourg has a relatively small parliament, but we still only found the official email addresses of 10 of its 60 members on the dark web (16%). However, Luxembourgish politicians have had a lot of passwords exposed and in plaintext — 38 to be exact — more than the entire Dutch parliament. However, this seems to be driven by one politician who had 29 of their passwords exposed in plaintext. While this is high and a major security vulnerability — each plaintext password is potentially a compromised account — it’s still nowhere near the worst offender we found in our investigation. That remains the French politician who had 138 passwords appear in plaintext on the dark web (their email appeared 137 times as well).
Similar to other countries we’ve looked at, Luxembourg has had multiple government websites taken down due to DDoS attacks by Russian hackers. For one two-week stretch in 2024, from the end of March through the beginning of April, Russian hackers attacked websites(yeni pencere) for the ministries of finance and justice, Luxembourg’s official statistics agency, and its national health fund, taking them offline repeatedly(yeni pencere).
We all must be more secure online – but especially government officials
As the examples above show, state actors affiliated with China and Russia are persistently probing European countries for any cracks in their cybersecurity. Even if none of these exposed email addresses leaked confidential information, they could be added to attackers’ databases, giving them one more piece of information they can leverage. And if a politician reused an exposed password on an official account (and neglected to use two-factor authentication), that could directly lead to a massive leak.
We can all learn from this. One of the biggest things to take away is you should never expose any personally identifiable information unnecessarily. Or, in this case, you should never use your professional email to create online accounts, especially if you’re a government official with access to secret information. Breaches happen all the time. If you create accounts using a government email, it’s only a matter of time before one will be leaked in a data breach. Then attackers instantly know they have information on a high-value target.
Here are some other easy steps that everyone — but especially politicians and other high-profile or public figures — can take to strengthen their account security:
Use email aliases: Email aliases hide your real email address while still letting you send and receive emails. If you never share your real email address, it can’t be leaked in a data breach. You can also delete aliases that have been exposed in leaks without needing to reset all your other accounts.
Use a password manager: A password manager makes it easy for you to use a strong, random, and unique password for each of your accounts. It should also provide ways to securely share passwords, making it easier to avoid having them fall into the wrong hands.
Use dark web monitoring services: Given how much trust we’re forced to give the companies we create accounts for, everyone should use some form of dark web monitoring to alert you if your information appears in these illegal marketplaces. This at least gives you a chance to update your email (or email alias) and password before anyone can exploit it.
Proton Pass can solve all of these problems. If you choose our Proton Pass Plus plan, you get:
A built-in two-factor authentication code generator
Pass Monitor, which alerts you if your Proton Mail email addresses or aliases appear on the dark web
Proton Sentinel, which defends your Proton Account against takeover attacks
Take control of your account security (and, if you’re a parliamentarian, help avert a national scandal) by signing up for a Proton Pass Plus plan today.