Security & Infrastructure Tools
Die Linke German political party confirms data stolen by Qilin ransomware
Qilin ransomware gang has stolen data from Germany’s Die Linke party, threatening to leak sensitive internal and employee information while confirming the membership database was untouched; the party has reported the breach to authorities, filed a police complaint, and is working with IT experts to restore systems amid concerns that the attack may be part of hybrid warfare.

Germany’s Die Linke party has confirmed that data was stolen in a cyberattack carried out by the Qilin ransomware group, a development that elevates concerns about the vulnerability of political organizations to digital threats. The sequence of events unfolded with a disclosed cyber incident on March 27, one day after the threat actor reportedly gained access to the party’s network. At that time, Die Linke refrained from stating that a data breach had occurred, though officials signaled that sensitive material might be at risk.
Die Linke, founded in 2007, remains a significant force in German politics. It currently holds 64 seats in the Bundestag and maintains roughly 123,000 registered members. The party’s influence extends beyond the federal parliament, with a notable presence in several state governments, particularly in eastern Germany. In public statements, Die Linke explained that the attackers’ stated objective appeared to be the publication of sensitive information from internal party operations as well as personal data pertaining to employees at the party headquarters. The party emphasized that, as of its latest findings, it cannot yet confirm the extent to which such data have been accessed or disclosed, but stressed that the risk of data leakage remains.
Crucially, Die Linke clarified that its membership database was not compromised. In other words, attempts to extract member data were unsuccessful, according to the party’s assessment. Nevertheless, the attackers reportedly sought access to internal organizational data and employee records, a distinction that underscores the potential aims of the intrusion beyond merely gathering member information. The party also stated that the operation appears to be targeted and not merely a random intrusion, reinforcing the view that the attack was deliberate and calculated.
Die Linke attributed the assault to the Qilin ransomware group, characterizing the threat actors as Russian-speaking cybercriminals driven by both financial incentives and political motives. The German party suggested that the attack did not happen by coincidence within the broader geopolitical environment, framing the incident as part of a larger pattern of digital aggression against political organizations. This framing aligns with a recurring narrative that such cyber operations can function as a form of hybrid warfare, affecting critical infrastructure and the functioning of political institutions.
On April 1, Qilin publicly claimed responsibility for the attack on Die Linke, listing the party among its victims on the group’s data leak site. In that post, however, the group did not publish any data samples from Die Linke, choosing instead to present its claim of the invasion and the status of the victim list. This is a common pressure tactic used by ransomware operators to coerce victims into paying ransoms, even when no immediate data leakage is observed.
In response to the incident, Die Linke has notified German authorities and filed a criminal complaint with the police. The party has also engaged independent IT experts to assist in safely restoring affected systems and to help determine the full scope of the breach. The move to involve law enforcement and external specialists indicates a multi-pronged approach to handling the aftermath and to strengthening cyber resilience in the wake of the intrusion.
Historical context further informs the situation. Germany has previously faced cyber threats linked to Russia-aligned actors targeting political entities. In 2024, for instance, security researchers identified a campaign by the group known as APT29 that targeted the CDU, one of Germany’s major parties, through a backdoor variant named WineLoader. The appearance of such activity on the German political landscape underscores the ongoing risk environment for political organizations operating in a digitally connected era.
As Die Linke moves through the investigation and recovery process, the incident serves as a reminder of the persistent and evolving threat landscape facing political institutions. The combination of targeted intrusions, potential data exposure, and the broader geopolitical context contributes to a sense of heightened vulnerability and the need for rigorous cyber defense measures across party structures and allied operations. The situation is being watched closely by observers of German politics and cyber security alike, given the potential implications for party operations, privacy concerns, and the integrity of political processes in a digital age.