Belgian Government Plagued By Hackers

Hackers claimed to have made a successful denial-of-service attack (DDoS) on the Belgian National Bank, shutting down the bank’s website for most of the morning of Monday 22nd February.

The attack followed a series of hacks over the previous weekend by the same cyber criminal group, which included attacks on the website of the Belgian Agency for Nuclear Control, the federal Crisis Center (coordinating the government’s security actions) and the federal Cyber Emergency Team’s website.

“From Friday onwards, websites have been periodically inaccessible,” said Miguel De Bruycker, director of the federal Center for Cybersecurity. “There is an investigation ongoing and we are providing all elements to prosecutors,” he said. “It is the first time such a whole series of short, criminal incidents has happened,” he added.

Authorities suspect the Belgian hackers purchased the botnet, or group of computers carrying out the DDoS attack, from a foreign criminal network.

The hacker collective goes by the name DownSec and uses symbols similar to those used by the global hacking network Anonymous. They claim to fight against “the abuses of a corrupt government” in a mission statement on their Facebook page.

But the hackers initially focused on their demand for an investigation into the suicide of a 14-year-old girl from Herstal, near Liège, who was allegedly cyber-bullied.

The recent incidents are the latest in a series of hacks of several government websites. The DownSec hackers crashed websites of the prime minister, Senate, the defense ministry and a number of political parties.

The hackers have successfully carried out denial-of-service attacks  meaning the public websites were inaccessible for a period of time. “The volume of traffic [directed at the governmental websites] was unusually high, which forced us to intervene,” said De Bruycker.

He said this was the first time Belgian authorities were faced with such a high volume of traffic in a DDoS attack. But agencies claimed the hackers did not gain access to internal data or servers, according to Davina Luyten of Belnet, who runs the Cyber Emergency Team’s website.

Politico: http://politi.co/1RjSIBf

« Inside The FBI's Encryption Battle With Apple
One-Third Of IT Staff Are Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.