Belgian Government Plagued By Hackers

Hackers claimed to have made a successful denial-of-service attack (DDoS) on the Belgian National Bank, shutting down the bank’s website for most of the morning of Monday 22nd February.

The attack followed a series of hacks over the previous weekend by the same cyber criminal group, which included attacks on the website of the Belgian Agency for Nuclear Control, the federal Crisis Center (coordinating the government’s security actions) and the federal Cyber Emergency Team’s website.

“From Friday onwards, websites have been periodically inaccessible,” said Miguel De Bruycker, director of the federal Center for Cybersecurity. “There is an investigation ongoing and we are providing all elements to prosecutors,” he said. “It is the first time such a whole series of short, criminal incidents has happened,” he added.

Authorities suspect the Belgian hackers purchased the botnet, or group of computers carrying out the DDoS attack, from a foreign criminal network.

The hacker collective goes by the name DownSec and uses symbols similar to those used by the global hacking network Anonymous. They claim to fight against “the abuses of a corrupt government” in a mission statement on their Facebook page.

But the hackers initially focused on their demand for an investigation into the suicide of a 14-year-old girl from Herstal, near Liège, who was allegedly cyber-bullied.

The recent incidents are the latest in a series of hacks of several government websites. The DownSec hackers crashed websites of the prime minister, Senate, the defense ministry and a number of political parties.

The hackers have successfully carried out denial-of-service attacks  meaning the public websites were inaccessible for a period of time. “The volume of traffic [directed at the governmental websites] was unusually high, which forced us to intervene,” said De Bruycker.

He said this was the first time Belgian authorities were faced with such a high volume of traffic in a DDoS attack. But agencies claimed the hackers did not gain access to internal data or servers, according to Davina Luyten of Belnet, who runs the Cyber Emergency Team’s website.

Politico: http://politi.co/1RjSIBf

« Inside The FBI's Encryption Battle With Apple
One-Third Of IT Staff Are Hackers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Spektion

Spektion

Spektion are transforming how organizations meet the challenge of third-party software risk.

UrbanFox

UrbanFox

UrbanFox’ powerful AI provides a simple and intuitive way to reduce fraud risk, whilst isolating potential fraudsters that cost your business money.