Belgian Government Plagued By Hackers

Hackers claimed to have made a successful denial-of-service attack (DDoS) on the Belgian National Bank, shutting down the bank’s website for most of the morning of Monday 22nd February.

The attack followed a series of hacks over the previous weekend by the same cyber criminal group, which included attacks on the website of the Belgian Agency for Nuclear Control, the federal Crisis Center (coordinating the government’s security actions) and the federal Cyber Emergency Team’s website.

“From Friday onwards, websites have been periodically inaccessible,” said Miguel De Bruycker, director of the federal Center for Cybersecurity. “There is an investigation ongoing and we are providing all elements to prosecutors,” he said. “It is the first time such a whole series of short, criminal incidents has happened,” he added.

Authorities suspect the Belgian hackers purchased the botnet, or group of computers carrying out the DDoS attack, from a foreign criminal network.

The hacker collective goes by the name DownSec and uses symbols similar to those used by the global hacking network Anonymous. They claim to fight against “the abuses of a corrupt government” in a mission statement on their Facebook page.

But the hackers initially focused on their demand for an investigation into the suicide of a 14-year-old girl from Herstal, near Liège, who was allegedly cyber-bullied.

The recent incidents are the latest in a series of hacks of several government websites. The DownSec hackers crashed websites of the prime minister, Senate, the defense ministry and a number of political parties.

The hackers have successfully carried out denial-of-service attacks  meaning the public websites were inaccessible for a period of time. “The volume of traffic [directed at the governmental websites] was unusually high, which forced us to intervene,” said De Bruycker.

He said this was the first time Belgian authorities were faced with such a high volume of traffic in a DDoS attack. But agencies claimed the hackers did not gain access to internal data or servers, according to Davina Luyten of Belnet, who runs the Cyber Emergency Team’s website.

Politico: http://politi.co/1RjSIBf

« Inside The FBI's Encryption Battle With Apple
One-Third Of IT Staff Are Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

National Cybersecurity Society (NCSS)

National Cybersecurity Society (NCSS)

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.