DDoS

Russia-aligned hacktivists persistently target key public and private organizations in the Netherlands with distributed denial of service (DDoS) attacks, causing access problems and service disruptions.

The situation was acknowledged via a statement by the country's National Cyber Security Center (NCSC), part of the Dutch Ministry of Justice.

"This week, several Dutch organizations have been targeted by large-scale DDoS attacks," reads the NCSC announcement.

Wiz

"The DDoS attacks are directed at both Dutch and other European organizations. Within the Netherlands, both public and private entities are being attacked."

The NCSC noted that the attacks were claimed by the hacktivist group named NoName057(16) on the threat actor's Telegram channel.

Telegram
Source: BleepingComputer

Although the NCSC said the threat actor's motive is unclear, NoName057(16) declared it was retribution for the Netherlands sending €6 billion in military aid to Ukraine and planning to allocate another €3.5 billion in 2026.

The threat group's latest message on Telegram from yesterday indicates that the attacks continue.

Telegram
Source: BleepingComputer

According to local media outlets, the DDoS attacks have impacted the provinces of Groningen, Noord-Holland, Zeeland, Drenthe, Overijssel, Noord-Brabant, and the municipalities of Apeldoorn, Breda, Nijmegen, and Tilburg.

tweet

The online portals of these public organizations were reportedly unreachable for several hours this week, though according to officials, there has been no compromise of internal systems or data.

NoName057(16) is a threat actor that, since March 2022, has had significant involvement in numerous DDoS attacks targeting European and American organizations.

The threat group even launched a crowdsourced DDoS platform called 'DDoSIA' where "volunteers" would get paid to lend their firepower in attacks.

The platform became very successful, recruiting thousands of users in under a year and launching multiple disruptive attacks on Western entities.

In July 2024, the Spanish authorities arrested three members of DDoSIA and seized their devices for further investigation.

However, there was no significant follow-up in the operation, and the leaders of the threat group have not been named or indicted yet, and so the DDoS attacks continue.

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

Ukrainian hacker charged with helping Russian hacktivist groups

US sanctions Russian hacktivists who breached water facilities

Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack

Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack

Denmark blames Russia for destructive cyberattack on water utility