Luxembourg: A Prime Target For Cyber Attack

Following recent reports by Wikileaks regarding cyber attacks by the CIA, Luxembourg's Prime Minister Xavier Bettel has confirmed that Luxembourg is increasingly a target of such attacks, but not necessarily by state actors.

Luxembourg MP Laurent Mosar (CSV) addressed a parliamentary question to Prime Minister Bettel following media reports that companies from Luxembourg had been the target of CIA cyber-attacks, asking Bettel to confirm these reports.

While Bettel confirmed that Wikileaks documents did reveal that certain servers (DNS – Domain name system) were vulnerable to attacks, such as being used as 'open resolver' by intruders or for DDoS-attacks (distributed denial-of-service), the Prime Minister insists that the Wikileaks reports do not confirm that the internal systems of concerned companies were indeed attacked.

Increasing number of attacks

Bettel goes on to explain that the Wikileaks documents do not target particular states as much as specific vulnerabilities of data processing systems. Notwithstanding, there was no denying that a high number of actors are trying to exploit these vulnerabilities in order to increase their capacities to intrude such systems no matter their hardware.

Without mentioning specific actors, Bettel writes that the number of attacks by "a whole series of actors is constantly increasing".

In a recently published report, the parliamentary control commission of Luxembourg's intelligence agency SREL writes that the threat level of cyber-attacks targeting Luxembourg was "high". 2016 was marked by a high number of cyber-attacks targeting both public institutions and private companies in Luxembourg.

Only recently, Luxembourg's state servers were under attack, without the 'Centre des Technologies de l'information de l'Etat' (CTIE) being able to identify the source of the attack.

The commission writes that "these cyber-attacks, characterised by their complex and evolved structures, are the doing of criminals, hackers with different motivations, companies or state actors".

Appropriate protection and confinement tools

Asked about possible measures by the government to prevent such attacks in future, Bettel states that the best protection was to be up to date about attackers' operational modes and to put in place the appropriate protection mechanisms or, in case of an attack, the effective confinement tools.

Politically, and given the complexity of such attacks, Bettel pleads for a cooperation of all concerned national actors and for international cooperation.

Furthermore, according to Bettel, the government wants to provide Luxembourg actors with the adequate technical tools and a legal framework allowing them to fulfil their missions of protecting IT systems and discovering operational modes.

Wort

You Might Aslo Read

For Sale: Access to 70,000 Hacked Computer Networks:

Hong Kong Hacked:

 

« Cybercrime Cost The Global Economy $450Billion In 2016
Targeted Ransomware Attacks Are Focusing On Business »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

National Cybersecurity and Communications Integration Center (NCCIC) - USA

National Cybersecurity and Communications Integration Center (NCCIC) - USA

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

DigiGlass

DigiGlass

DigiGlass is a cutting-edge cybersecurity service provider powered by Redington Gulf, a leading technology distributor in the Middle East and Africa.