Dutch police blame ‘state actor’ for recent data breach

Avatar

Dutch national police have deemed it “very likely” that a state-sponsored threat actor was behind a large-scale data breach discovered last week.

During the attack, unidentified hackers stole “work-related contact details,” including names, email addresses, phone numbers and private information from some of the agency’s 65,000 officers. 

In a statement released earlier this week, the police said local intelligence services had informed them that “another country or perpetrators acting on behalf of another country” could be responsible for the attack.

Few details have been revealed about the incident and its impact. 

“In order not to make the perpetrators any wiser and not to harm the investigation, no further information can be shared at this time,” the police said, adding that they have “implemented strong security measures” in response to the breach.

“Police officers are working day and night to prevent or counter new cyber threats and to track down the perpetrators.”

Dutch Justice Minister David van Weel said last week that the attack did not compromise the police’s “private data and research data.” He did not specify how the breach could affect officers working undercover.

A police spokesperson told local media that the attack caused “great concern” among employees, who were left wondering what specific data was involved and whether more information had been stolen.

The Dutch Police Union called the attack a “nightmare,” emphasizing that the need for strong data protection within the police force has become painfully clear.

While the investigation into the incident is ongoing, the police have advised their employees to be cautious about suspicious apps, potential phishing emails, and issues with logging into their devices.

News BriefsNewsNation-statePrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

White House official says insurance companies must stop funding ransomware payments

Related Posts

North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nation-state adversary, which had made a habit of incorporating rafts of Windows zero-day exploits into its arsenal in recent months.
Avatar
Read More

Over 1 Million Domains at Risk of ‘Sitting Ducks’ Domain Hijacking Technique

Over a million domains are susceptible to takeover by malicious actors by means of what has been called a Sitting Ducks attack. The powerful attack vector, which exploits weaknesses in the domain name system (DNS), is being exploited by over a dozen Russian-nexus cybercriminal actors to stealthily hijack domains, a joint analysis published by Infoblox and Eclypsium has revealed. "In a Sitting
Avatar
Read More