Dutch police blame ‘state actor’ for recent data breach

Avatar

Dutch national police have deemed it “very likely” that a state-sponsored threat actor was behind a large-scale data breach discovered last week.

During the attack, unidentified hackers stole “work-related contact details,” including names, email addresses, phone numbers and private information from some of the agency’s 65,000 officers. 

In a statement released earlier this week, the police said local intelligence services had informed them that “another country or perpetrators acting on behalf of another country” could be responsible for the attack.

Few details have been revealed about the incident and its impact. 

“In order not to make the perpetrators any wiser and not to harm the investigation, no further information can be shared at this time,” the police said, adding that they have “implemented strong security measures” in response to the breach.

“Police officers are working day and night to prevent or counter new cyber threats and to track down the perpetrators.”

Dutch Justice Minister David van Weel said last week that the attack did not compromise the police’s “private data and research data.” He did not specify how the breach could affect officers working undercover.

A police spokesperson told local media that the attack caused “great concern” among employees, who were left wondering what specific data was involved and whether more information had been stolen.

The Dutch Police Union called the attack a “nightmare,” emphasizing that the need for strong data protection within the police force has become painfully clear.

While the investigation into the incident is ongoing, the police have advised their employees to be cautious about suspicious apps, potential phishing emails, and issues with logging into their devices.

News BriefsNewsNation-statePrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

White House official says insurance companies must stop funding ransomware payments

Next Post

Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability

Related Posts

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild. According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S. (554) and India (461), followed by Thailand (80), Mexico (48), Indonesia
Avatar
Read More

Wherever There’s Ransomware, There’s Service Account Compromise. Are You Protected?

Until just a couple of years ago, only a handful of IAM pros knew what service accounts are. In the last years, these silent Non-Human-Identities (NHI) accounts have become one of the most targeted and compromised attack surfaces. Assessments report that compromised service accounts play a key role in lateral movement in over 70% of ransomware attacks. However, there’s an alarming disproportion
Avatar
Read More