Luxembourg: A Prime Target For Cyber Attack

Following recent reports by Wikileaks regarding cyber attacks by the CIA, Luxembourg's Prime Minister Xavier Bettel has confirmed that Luxembourg is increasingly a target of such attacks, but not necessarily by state actors.

Luxembourg MP Laurent Mosar (CSV) addressed a parliamentary question to Prime Minister Bettel following media reports that companies from Luxembourg had been the target of CIA cyber-attacks, asking Bettel to confirm these reports.

While Bettel confirmed that Wikileaks documents did reveal that certain servers (DNS – Domain name system) were vulnerable to attacks, such as being used as 'open resolver' by intruders or for DDoS-attacks (distributed denial-of-service), the Prime Minister insists that the Wikileaks reports do not confirm that the internal systems of concerned companies were indeed attacked.

Increasing number of attacks

Bettel goes on to explain that the Wikileaks documents do not target particular states as much as specific vulnerabilities of data processing systems. Notwithstanding, there was no denying that a high number of actors are trying to exploit these vulnerabilities in order to increase their capacities to intrude such systems no matter their hardware.

Without mentioning specific actors, Bettel writes that the number of attacks by "a whole series of actors is constantly increasing".

In a recently published report, the parliamentary control commission of Luxembourg's intelligence agency SREL writes that the threat level of cyber-attacks targeting Luxembourg was "high". 2016 was marked by a high number of cyber-attacks targeting both public institutions and private companies in Luxembourg.

Only recently, Luxembourg's state servers were under attack, without the 'Centre des Technologies de l'information de l'Etat' (CTIE) being able to identify the source of the attack.

The commission writes that "these cyber-attacks, characterised by their complex and evolved structures, are the doing of criminals, hackers with different motivations, companies or state actors".

Appropriate protection and confinement tools

Asked about possible measures by the government to prevent such attacks in future, Bettel states that the best protection was to be up to date about attackers' operational modes and to put in place the appropriate protection mechanisms or, in case of an attack, the effective confinement tools.

Politically, and given the complexity of such attacks, Bettel pleads for a cooperation of all concerned national actors and for international cooperation.

Furthermore, according to Bettel, the government wants to provide Luxembourg actors with the adequate technical tools and a legal framework allowing them to fulfil their missions of protecting IT systems and discovering operational modes.

Wort

You Might Aslo Read

For Sale: Access to 70,000 Hacked Computer Networks:

Hong Kong Hacked:

 

« Cybercrime Cost The Global Economy $450Billion In 2016
Targeted Ransomware Attacks Are Focusing On Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

NextPlane

NextPlane

NextPlane provide secure real-time B2B unified communication and collaboration solutions within and across business systems.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Mindgard

Mindgard

The Mindgard Security Copilot platform secures your Artificial Intelligence, GenAI and LLMs.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.