logo
Dutch government says pro-Russian hackers target municipalities linked to this week's NATO summit

Dutch government says pro-Russian hackers target municipalities linked to this week's NATO summit

Washington Post23-06-2025
THE HAGUE, Netherlands — Pro-Russian hackers launched a series of denial-of-service attacks Monday on several municipalities and organizations linked to a NATO summit this week in the Netherlands, the Dutch government announced.
The National Cybersecurity Center said in a statement that many of the attacks were claimed by a pro-Russian hackers' group known as NoName057(16) 'and appear to have a pro-Russian ideological motive.' It did not elaborate.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Chinese hackers breach US nuclear security agency in cyberattack operation, officials say
Chinese hackers breach US nuclear security agency in cyberattack operation, officials say

Fox News

timean hour ago

  • Fox News

Chinese hackers breach US nuclear security agency in cyberattack operation, officials say

A sweeping cyberattack breached the U.S. National Nuclear Security Administration (NNSA) through Microsoft's Sharepoint document software, the Energy Department confirmed to Fox News Digital on Wednesday. The agency does not know of any sensitive or classified information that has been stolen at this time. "On Friday, July 18th, the exploitation of a Microsoft SharePoint zero-day vulnerability began affecting the Department of Energy, including the NNSA," a Department of Energy (DoE) told Fox News Digital, referring to the agency responsible for maintaining and designing the nation's nuclear weapons stockpiles. MICROSOFT ENDS USE OF CHINA-BASED COMPUTER ENGINEERS FOR CERTAIN DEFENSE DEPT PROJECTS AMID ESPIONAGE FEARS Microsoft warned that Chinese state-sponsored actors were exploiting flaws in the SharePoint software of institutions across the globe. Netherlands-based Eye Security told Reuters the breach has now claimed 400 victims. Linen Typhoon and Violet Typhoon, the two groups backed by the CCP involved in the hack, utilized flaws in the document-sharing software that exist for customers who run it on their own networks rather than through Microsoft's cloud software. But DoE said it largely utilizes the cloud, so only a "very small number of systems were impacted." "All impacted systems are being restored." Another hacking group based in China, Storm-2603, also exploited the vulnerabilities, according to Microsoft. Asked about the hack on Wednesday, Chinese foreign ministry spokesperson Guo Jiakun said he wasn't aware of the specifics, but: "China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues." Charles Carmakal, technology chief of the Google-owned Mandiant cybersecurity consulting group, confirmed Monday in a LinkedIn post that at least one of the organizations involved in the hack was a "China-nexus threat actor." NATIONAL SECURITY EXPERTS RAISE CONCERNS AFTER MICROSOFT PROGRAM EXPOSED AS POSSIBLE AVENUE FOR CHINESE SPYING On Sunday, the U.S. Cybersecurity and Infrastructure Security Agency said it was "aware of active exploitation" of the SharePoint vulnerability. CLICK HERE TO GET THE FOX NEWS APP Microsoft CEO Satya Nadella vowed last year to make cybersecurity a top priority after a government report criticized the company's handling of a Chinese breach of the emails of U.S. government officials. Just last week, the company vowed to stop using engineers based in China to provide technical support for clients within the Defense Department using the company's cloud services. That came after a ProPublica report revealed the practice and said it could expose the DoD to Chinese hackers.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store