Luxembourg: A Prime Target For Cyber Attack

Following recent reports by Wikileaks regarding cyber attacks by the CIA, Luxembourg's Prime Minister Xavier Bettel has confirmed that Luxembourg is increasingly a target of such attacks, but not necessarily by state actors.

Luxembourg MP Laurent Mosar (CSV) addressed a parliamentary question to Prime Minister Bettel following media reports that companies from Luxembourg had been the target of CIA cyber-attacks, asking Bettel to confirm these reports.

While Bettel confirmed that Wikileaks documents did reveal that certain servers (DNS – Domain name system) were vulnerable to attacks, such as being used as 'open resolver' by intruders or for DDoS-attacks (distributed denial-of-service), the Prime Minister insists that the Wikileaks reports do not confirm that the internal systems of concerned companies were indeed attacked.

Increasing number of attacks

Bettel goes on to explain that the Wikileaks documents do not target particular states as much as specific vulnerabilities of data processing systems. Notwithstanding, there was no denying that a high number of actors are trying to exploit these vulnerabilities in order to increase their capacities to intrude such systems no matter their hardware.

Without mentioning specific actors, Bettel writes that the number of attacks by "a whole series of actors is constantly increasing".

In a recently published report, the parliamentary control commission of Luxembourg's intelligence agency SREL writes that the threat level of cyber-attacks targeting Luxembourg was "high". 2016 was marked by a high number of cyber-attacks targeting both public institutions and private companies in Luxembourg.

Only recently, Luxembourg's state servers were under attack, without the 'Centre des Technologies de l'information de l'Etat' (CTIE) being able to identify the source of the attack.

The commission writes that "these cyber-attacks, characterised by their complex and evolved structures, are the doing of criminals, hackers with different motivations, companies or state actors".

Appropriate protection and confinement tools

Asked about possible measures by the government to prevent such attacks in future, Bettel states that the best protection was to be up to date about attackers' operational modes and to put in place the appropriate protection mechanisms or, in case of an attack, the effective confinement tools.

Politically, and given the complexity of such attacks, Bettel pleads for a cooperation of all concerned national actors and for international cooperation.

Furthermore, according to Bettel, the government wants to provide Luxembourg actors with the adequate technical tools and a legal framework allowing them to fulfil their missions of protecting IT systems and discovering operational modes.

Wort

You Might Aslo Read

For Sale: Access to 70,000 Hacked Computer Networks:

Hong Kong Hacked:

 

« Cybercrime Cost The Global Economy $450Billion In 2016
Targeted Ransomware Attacks Are Focusing On Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

CyberArrow

CyberArrow

CyberArrow (formerly EBDAA) is a consultancy company providing high quality consultancy services in Risk & Compliance and Awareness & Education.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.