Police tender for breaking passwords and security of Office 2007/2010/2013

Cybersecurity plays an extremely important role in the era of global Internet. In the last decade, the rise of cyberatics using cryptography has made securing the most important state institutions a priority. Fighting criminals to such priorities belongs. The Polish Police, in order to fight with professional criminal organizations whose aim is to break computer security and data encryption in order to obtain a ransom, has announced a tender for software and infrastructure that will increase the effectiveness of actions in identifying and combating cyber threats.

The tender for the cybercrypt @ gov project is aimed at strengthening the role of the Polish Police in detecting computer crimes and cybercrime by building a unique system with very high efficiency due to the use of distributed computing and the use of already existing infrastructure and IT resources on the Police equipment. Additional tasks to be completed by the announced tender are to strengthen cooperation between law enforcement authorities: the system will be used by various Police units (forensic laboratories, departments with Cybercrime KGP / KWP / CBŚP).

In the cybercrypt @ gov project guidelines we find a description of the tools that allow you to crack hashes based, among others, on for shortcuts: MD4, MD5, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3 (Keccak), NetNTLMv1, NetNTLMv1 + ESS, NetNTLMv2, sha256crypt, sha512crypt, and an attempt to break security programs include: Office 2007, 2010, 2013, secured PDF files, KeePass password databases, password protected ZIP and RAR archives, and commonly used encryption applications such as Truecrypt, Veracrypt and Bitlocker.

cybercrypt @ gov police tender

The assumptions of the project are really impressive and it seems that the police have a snore on encrypted information with open encryption algorithms. It is worth remembering that the data is protected not only because of fear of surveillance or protection from law enforcement agencies. This is a natural way used by journalists, companies and ordinary people who have nothing to hide to protect their own interests and intellectual property from unauthorized access.

The cybercrypt @ gov project will be financed by the National Center for Research and Development. The contractor will not only be required to develop the necessary tools. Its tasks will include infrastructure management under the supervision of representatives of the Police Commander-in-Chief or other cooperating units delegated to this work.

Add new comment

The content of this field is kept private and will not be shown publicly.

Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.