Russian & Chines Affiliated Hackers Attack The Netherlands

The Dutch  National Coordinator for Counter-Terrorism and Security (NCTV) has warned that  both Russia and China  are intensifying their cyber attacks against the Netherlands and NATO allies.

China's activity is no longer just espionage but appears to be extending pepartions for sabotage.

These hackers are focused on penetrating critical infrastructure for potential future sabotage, as well as to obtain sensitive information, the NCTV said in it’s recently published research. 

According to the NCTV, the Chinese-originated offensive cyber operations are in collaboration with businesses, universities, and Chinese intelligence services. While Chinese state-sponsored hacker groups have long conducted large-scale and persistent cyber espionage campaigns against the Netherlands and its allies, there has been an increase in the intensity, scope and technical sophistication of these campaigns over the past year.  

One of the latest Chinese government hacking operations, known as Volt Typhoon, shows that although China has hitherto  focused on espionage, the latest activity has  targeted critical infrastructure to potentially take destructive action.

In a related development,  the Dutch national police have reported that unidentified hackers stole “work-related contact details,” including names, email addresses, phone numbers and private information from thousands of its officers. 

The police have said that it is very likely that a state-sponsored threat actor was behind the data breach. 

NCTV   |   NCTV   |   Security Delta   |   The Record   |    SCWorld  |   Security Affairs    

Image:  Ideogram

You Might Also Read: 


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Social Media Algorithms & Their Effects [extract]
Canada Accuses India Of Using Spyware To Track Separatists »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

Secure Blink

Secure Blink

Secure Blink provides automated application and API security solutions that empower developers and security engineers to protect critical assets from exploitation.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.