"We should all be angry … The information is now freely available to everyone Many, many people in Bulgaria already have this file, and I believe it is not just in Bulgaria," Genov said Blogger and political analyst. He knows that his data has been compromised, because although he is not an IT expert, he managed to find the stolen files online.
Government databases are honeypots for hackers. They contain a wealth of information that, according to experts, can be "useful" for years to come.
"You can make your password (password) longer and more complex, but the information contained in the government will not change," said Guy Bunker, an information security specialist and Chief Technology Officer at Clearswift, a cybersecurity firm.
"Your date of birth will not change, you will not move tomorrow," he said. "Many of the information gathered yesterday is valid today and is likely to be valid for a large number of people in five, ten, twenty years."
Data breaches were formerly led by highly-skilled hackers. However, there is a growing need for sophisticated and carefully planned operations to penetrate IT systems. Hacking tools and malware available on the dark internet allow amateur hackers to do tremendous damage.
Nonetheless, attacks on government systems are increasing, said Adam Levin, founder of CyberScout, another cybersecurity firm. "It's just a war – one we'll win if we make cybersecurity a central issue," he said.
The notion that governments need to step up their cybersecurity game is not new. Experts have been ringing alarm bells for years.
The US Department of Veterans Affairs received one of the first serious data breaches in 2006, when personal data was compromised by more than 26 million veterans and military personnel.
"And it was all:" Oh, that's terrible, we have to do things to stop it. "And here we are, 13 years later, and the data of a whole Lands were compromised, and in between there were cases where large amounts of citizen data were compromised in different countries, "Bunker said.
Out-of-date systems are often the problem. Some governments may have used private companies to manage the data they collect, before the numerous hacks and breeches turned their attention to cybersecurity.
"In many cases, our data was sent to third-party companies years ago," Levin said. "The way we looked at data management 10 years ago now seems outdated, but old data is still managed by third parties using legacy systems." Spies have stolen NSA hacking tools, find reports "class =" media__image "src =" http://cdn.cnn.com/cnnnext/dam/assets/140519160640-lead-china-us-chinese-hackers-story- top.png "/>