Sunday, April 13, 2025
HomeCyber Attack12 Norway Government Ministries were Targeted in a Cyberattack

12 Norway Government Ministries were Targeted in a Cyberattack

Published on

SIEM as a Service

Follow Us on Google News

According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks.

The most recent attack was aimed at Norway’s public sector, and investigations are currently ongoing.

Norway has been Europe’s largest gas supplier after Russia had a drop in the supply. Norway has also become Western Europe’s largest oil exporter.

- Advertisement - Google News

The cyber attack was identified as there was unusual traffic in Norway’s platform which was discovered on July 12.

Erik Hope, the head of the government agency and in charge of providing services to the ministries, said, “We identified a weakness in the platform of one of our suppliers and that weakness has now been shut”.

Norway Prognosticated in February

In February, the Nordic Police Security Agency (PST) was taking necessary precautions for a cyber attack in response to the war between Russia and Ukraine.

The PST said, ”Moscow would likely prioritize actions such as illegal gathering of intelligence, theft of information, cyber operations or cultivating sources, these are more probable”.

As predicted, there was a Distributed Denial-of-service (DDoS) attack against Norway’s state sector in June 2022, which was to be blamed on a “Criminal Russian pro group”.

However, the recent cyber attack did not affect the Prime Minister’s Office, including ministries like Foreign, Defense, and Justice, as they were using a different IT platform.

Norway is NATO’s northernmost member. Cyber attacks against Norway have seen massive increases between 2019 and 2021. The incidents stayed at the same level in 2022. Norway has increased military alerts ever since the war in Ukraine.

The tensions between the two nations remain in the same stage, affecting the neighboring countries and other nations.

However, cyber-attacks have seen a large increase in recent times and are predicted to increase furthermore. 

Peace must prevail between the two nations, which will contribute a lot of good towards humanity and a great benefit for the neighboring nations and the world.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...