Luxembourg: A Prime Target For Cyber Attack

Following recent reports by Wikileaks regarding cyber attacks by the CIA, Luxembourg's Prime Minister Xavier Bettel has confirmed that Luxembourg is increasingly a target of such attacks, but not necessarily by state actors.

Luxembourg MP Laurent Mosar (CSV) addressed a parliamentary question to Prime Minister Bettel following media reports that companies from Luxembourg had been the target of CIA cyber-attacks, asking Bettel to confirm these reports.

While Bettel confirmed that Wikileaks documents did reveal that certain servers (DNS – Domain name system) were vulnerable to attacks, such as being used as 'open resolver' by intruders or for DDoS-attacks (distributed denial-of-service), the Prime Minister insists that the Wikileaks reports do not confirm that the internal systems of concerned companies were indeed attacked.

Increasing number of attacks

Bettel goes on to explain that the Wikileaks documents do not target particular states as much as specific vulnerabilities of data processing systems. Notwithstanding, there was no denying that a high number of actors are trying to exploit these vulnerabilities in order to increase their capacities to intrude such systems no matter their hardware.

Without mentioning specific actors, Bettel writes that the number of attacks by "a whole series of actors is constantly increasing".

In a recently published report, the parliamentary control commission of Luxembourg's intelligence agency SREL writes that the threat level of cyber-attacks targeting Luxembourg was "high". 2016 was marked by a high number of cyber-attacks targeting both public institutions and private companies in Luxembourg.

Only recently, Luxembourg's state servers were under attack, without the 'Centre des Technologies de l'information de l'Etat' (CTIE) being able to identify the source of the attack.

The commission writes that "these cyber-attacks, characterised by their complex and evolved structures, are the doing of criminals, hackers with different motivations, companies or state actors".

Appropriate protection and confinement tools

Asked about possible measures by the government to prevent such attacks in future, Bettel states that the best protection was to be up to date about attackers' operational modes and to put in place the appropriate protection mechanisms or, in case of an attack, the effective confinement tools.

Politically, and given the complexity of such attacks, Bettel pleads for a cooperation of all concerned national actors and for international cooperation.

Furthermore, according to Bettel, the government wants to provide Luxembourg actors with the adequate technical tools and a legal framework allowing them to fulfil their missions of protecting IT systems and discovering operational modes.

Wort

You Might Aslo Read

For Sale: Access to 70,000 Hacked Computer Networks:

Hong Kong Hacked:

 

« Cybercrime Cost The Global Economy $450Billion In 2016
Targeted Ransomware Attacks Are Focusing On Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.