Gordon Brown claims malware used in NOTW hacking
The former Prime Minister says Trojans were used by the now deceased tabloid as the hacking scandal rages on.


Former Prime Minister Gordon Brown claimed yesterday the News of the World not only hacked phones, but used malware to steal information too.
During a House of Commons debate, Brown said the News of the World had committed "new crimes with new names," including using "Trojans to break into computers and not just phones."
"It was not the misconduct of a few rogues or a few freelancers but, I have to say, lawbreaking often on an industrial scale - at its worst dependent on links with the British criminal underworld," Brown claimed.
"Amassed against these guiltless victims and against a succession of other victims of crime, whose names I know about and have seen and have yet to be made public, was the systematic use of base and unlawful methods."
Prime Minister David Cameron confirmed the criminal investigation into the News of the World phone hacking was fully underway, with a different team to the one which carried out the original investigation.
The police probe is being led by Deputy Assistant Commissioner Sue Akers, whose team is looking through 11,000 pages containing 3,870 names, and around 4,000 mobile and 5,000 landline phone numbers, Cameron said. There was no mention of investigations into computer hacking.
Eight arrests have been made so far, with "numerous interviews" undertaken as well.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Clearly there are two pieces of work that have to be done. First, we need a full investigation into wrongdoing in the press and the police, including the failure of the first police investigation," the Prime Minister added.
"Secondly, we need a review of regulation of the press. We would like to get on with both those elements as quickly as possible, while being mindful of the ongoing criminal investigations."
A single inquiry into the hacking scandal will consist of two strands, Cameron confirmed.
Lord Justice Leveson will lead that inquiry, reporting to both the Home Secretary, Theresa May, and the Secretary of State for Culture, Media and Sport, Jeremy Hunt.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cisco takes aim at AI security at RSAC with ServiceNow partnership
News The companies claim Cisco AI Defense and ServiceNow SecOps will help address new challenges raised by AI
By Jane McCallion
-
Why veterans can excel in data centers – and could help the IT sector address its skill shortages
In-depth Ex-military workers can bring software and hardware to civilian roles
By John Loeppky
-
CronRat Magecart malware uses 31st February date to remain undetected
News The malware allows for server-side payment skimming that bypasses browser security
By Rene Millman
-
Mekotio trojan continues to spread despite its operators’ arrests
News Hackers have used it in 100 more attacks since arrests
By Rene Millman
-
“Trojan Source” hides flaws in source code from humans
News Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
By Rene Millman
-
What is Emotet?
In-depth A deep dive into one of the most infamous and prolific strains of malware
By Praharsha Anand
-
Fake AnyDesk Google ads deliver malware
News Malware pushed through Google search results
By Rene Millman
-
Hackers use open source Microsoft dev platform to deliver trojans
News Microsoft's Build Engine is being used to deploy Remcos password-stealing malware
By Rene Millman
-
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
News The source code for the authenticator-breaking malware is available for free on underground forums
By Sabina Weston
-
Qbot malware surges into the top-ten most common business threats
News An evolved form of the banking Trojan was distributed by number one-ranking Emotet in a campaign that hit 5% of businesses globally
By Keumars Afifi-Sabet