Dutch police blame ‘state actor’ for recent data breach

Avatar

Dutch national police have deemed it “very likely” that a state-sponsored threat actor was behind a large-scale data breach discovered last week.

During the attack, unidentified hackers stole “work-related contact details,” including names, email addresses, phone numbers and private information from some of the agency’s 65,000 officers. 

In a statement released earlier this week, the police said local intelligence services had informed them that “another country or perpetrators acting on behalf of another country” could be responsible for the attack.

Few details have been revealed about the incident and its impact. 

“In order not to make the perpetrators any wiser and not to harm the investigation, no further information can be shared at this time,” the police said, adding that they have “implemented strong security measures” in response to the breach.

“Police officers are working day and night to prevent or counter new cyber threats and to track down the perpetrators.”

Dutch Justice Minister David van Weel said last week that the attack did not compromise the police’s “private data and research data.” He did not specify how the breach could affect officers working undercover.

A police spokesperson told local media that the attack caused “great concern” among employees, who were left wondering what specific data was involved and whether more information had been stolen.

The Dutch Police Union called the attack a “nightmare,” emphasizing that the need for strong data protection within the police force has become painfully clear.

While the investigation into the incident is ongoing, the police have advised their employees to be cautious about suspicious apps, potential phishing emails, and issues with logging into their devices.

News BriefsNewsNation-statePrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

White House official says insurance companies must stop funding ransomware payments

Next Post

Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability

Related Posts

University Professors Targeted by North Korean Cyber Espionage Group

The North Korea-linked threat actor known as Kimsuky has been linked to a new set of attacks targeting university staff, researchers, and professors for intelligence gathering purposes. Cybersecurity firm Resilience said it identified the activity in late July 2024 after it observed an operation security (OPSEC) error made by the hackers. Kimsuky, also known by the names APT43, ARCHIPELAGO,
Avatar
Read More

RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks

Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called BlastRADIUS that could be exploited by an attacker to stage Mallory-in-the-middle (MitM) attacks and bypass integrity checks under certain circumstances. "The RADIUS protocol allows certain Access-Request messages to have no integrity or authentication checks," InkBridge
Avatar
Read More