{"id":7779,"date":"2026-04-10T13:14:42","date_gmt":"2026-04-10T13:14:42","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7779"},"modified":"2026-04-10T13:14:42","modified_gmt":"2026-04-10T13:14:42","slug":"hungarian-government-email-passwords-exposed-ahead-of-election","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7779","title":{"rendered":"Hungarian government email passwords exposed ahead of election"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>When voters in the forthcoming Hungarian election assess the current government, its record on internet security will not be one of its proudest achievements.<\/p>\n<p>An <a href=\"https:\/\/www.bellingcat.com\/news\/2026\/04\/09\/the-hungarian-government-passwords-exposed-online\/\" target=\"_blank\" rel=\"noopener\">analysis by open source investigation organization Bellingcat<\/a> has revealed that the passwords for almost 800 Hungarian government email accounts are circulating online, many of them associated with national security. These breaches in security are not down to high-tech attacks but rather are the result of poor email hygiene among government employees. The security leaks were widespread: 12 out of 13 government departments were affected.<\/p>\n<p>Hungarian Prime Minister Viktor Orban\u2019s administration likes to present itself as firm protector of Hungarian borders, resisting foreign interference, but this doesn\u2019t seem to apply to its computing prowess. Among those whose details were revealed were an officer responsible for information security and a counter-terrorism expert.<\/p>\n<p>Bellingcat found that government officials have been using <a href=\"https:\/\/www.csoonline.com\/article\/4021827\/the-10-most-common-it-security-mistakes.html#:~:text=The%20problem%3A%20Weak%20passwords\">weak passwords<\/a> such as variations of the word \u201cPassword\u201d or the number sequence \u201c1234567, while another simply used his surname.<\/p>\n<p>The Hungarian government is not alone in its laxity.\u00a0 Earlier this year, <a href=\"https:\/\/www.pcworld.com\/article\/3041604\/6-billion-passwords-reveal-you-should-not-use-these-login-details.html\">Specops found that 6 billion logins<\/a> had been exposed online and found that number sequences and \u2018password\u2019 featured highly in the list of the most compromised logins.<\/p>\n<p>The vulnerabilities inherent in the Hungarian example are a warning to all CSOs that they should be reminding their staff to tighten their security credentials. Many choose simple, short memorable passwords because they\u2019re easy to remember but using a <a href=\"https:\/\/www.pcworld.com\/article\/2607601\/memorizing-a-good-email-password-is-easy-heres-how-to-do-it.html\">password manager<\/a> or deploying <a href=\"https:\/\/www.computerworld.com\/article\/4009132\/passkeys-how-they-work-how-to-use-them.html\">passkeys<\/a> will immediately strengthen employees\u2019 ability to protect data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>When voters in the forthcoming Hungarian election assess the current government, its record on internet security will not be one of its proudest achievements. An analysis by open source investigation organization Bellingcat has revealed that the passwords for almost 800 Hungarian government email accounts are circulating online, many of them associated with national security. These [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":7780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7779"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7779"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7779\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/7780"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}