Overview
- Experts reconstructed the compromised server and confirmed a subtle pathway that likely enabled hackers to siphon officer phone numbers, device IDs and user names
- Attackers exploited two vulnerabilities in the globally used mobile device management software governing over 3,500 police smartphones
- Authorities stress that no investigative or personnel records were stored on the server, limiting exposed data to basic device metadata
- The precise amount of information extracted remains unknown as forensic teams continue to probe the breach
- Meanwhile, Mecklenburg-Vorpommern police are relying on legacy radio communications and issuing substitute phones to select officers while a full server replacement is underway