Luxembourg: A Prime Target For Cyber Attack

Following recent reports by Wikileaks regarding cyber attacks by the CIA, Luxembourg's Prime Minister Xavier Bettel has confirmed that Luxembourg is increasingly a target of such attacks, but not necessarily by state actors.

Luxembourg MP Laurent Mosar (CSV) addressed a parliamentary question to Prime Minister Bettel following media reports that companies from Luxembourg had been the target of CIA cyber-attacks, asking Bettel to confirm these reports.

While Bettel confirmed that Wikileaks documents did reveal that certain servers (DNS – Domain name system) were vulnerable to attacks, such as being used as 'open resolver' by intruders or for DDoS-attacks (distributed denial-of-service), the Prime Minister insists that the Wikileaks reports do not confirm that the internal systems of concerned companies were indeed attacked.

Increasing number of attacks

Bettel goes on to explain that the Wikileaks documents do not target particular states as much as specific vulnerabilities of data processing systems. Notwithstanding, there was no denying that a high number of actors are trying to exploit these vulnerabilities in order to increase their capacities to intrude such systems no matter their hardware.

Without mentioning specific actors, Bettel writes that the number of attacks by "a whole series of actors is constantly increasing".

In a recently published report, the parliamentary control commission of Luxembourg's intelligence agency SREL writes that the threat level of cyber-attacks targeting Luxembourg was "high". 2016 was marked by a high number of cyber-attacks targeting both public institutions and private companies in Luxembourg.

Only recently, Luxembourg's state servers were under attack, without the 'Centre des Technologies de l'information de l'Etat' (CTIE) being able to identify the source of the attack.

The commission writes that "these cyber-attacks, characterised by their complex and evolved structures, are the doing of criminals, hackers with different motivations, companies or state actors".

Appropriate protection and confinement tools

Asked about possible measures by the government to prevent such attacks in future, Bettel states that the best protection was to be up to date about attackers' operational modes and to put in place the appropriate protection mechanisms or, in case of an attack, the effective confinement tools.

Politically, and given the complexity of such attacks, Bettel pleads for a cooperation of all concerned national actors and for international cooperation.

Furthermore, according to Bettel, the government wants to provide Luxembourg actors with the adequate technical tools and a legal framework allowing them to fulfil their missions of protecting IT systems and discovering operational modes.

Wort

You Might Aslo Read

For Sale: Access to 70,000 Hacked Computer Networks:

Hong Kong Hacked:

 

« Cybercrime Cost The Global Economy $450Billion In 2016
Targeted Ransomware Attacks Are Focusing On Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.