Dutch Intelligence Agency Pinpoints Cyberattacks

Attempts at digital espionage and online political manipulation in Europe are on the rise both in number and in complexity, the Netherlands’ main intelligence agency AIVD said recently in its annual report.

Adding its voice to fears around the world of a rise in covert digital influence and espionage, the Dutch General Intelligence and Security Service said in its 2017 report a growing number of foreign powers are using cyber espionage “to acquire information that they use for geo-political gain.”

It highlighted Russia, which it said is “extremely driven in the covert digital influencing of political decision making processes.” It added that the agency also has seen similar attempts by China.

The intelligence agency, known by its Dutch acronym AIVD, is known for its tracking of online threats. Dutch media reported in January that AIVD hackers penetrated the computers used by a Russian hacking group known as Cozy Bear in mid-2014 and watched them for at least a year, even managing to catch the hackers on camera.

Daily newspaper De Volkskrant and television current affairs show Nieuwsuur said Dutch spies used their access to help oust Cozy Bear from US State Department computers in late 2014. The AIVD declined comment on the reports.

In its annual report, the agency said online spying is also being used to infiltrate European multinationals, research institutes as well as the energy, high-tech and chemicals sectors.

Fifth Domain:

You Might Also Read: 

Spy vs Spy - Cozy Bear Hackers Hacked:

New Dutch Law Would Allow Bulk Surveillance:
 

 

« Blockchain: What Business Executives Need To Know
UK Police Introduce Cyber Security Certification »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

10Duke

10Duke

Identity management and entitlement solutions that help you connect to your online customers and drive engagement and revenue.

Avaya

Avaya

Avaya provide business solutions for Secure Networking, Cloud, Customer and Team Engagement.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.