Tuesday, February 11, 2025
HomeCyber Attack12 Norway Government Ministries were Targeted in a Cyberattack

12 Norway Government Ministries were Targeted in a Cyberattack

Published on

SIEM as a Service

Follow Us on Google News

According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks.

The most recent attack was aimed at Norway’s public sector, and investigations are currently ongoing.

Norway has been Europe’s largest gas supplier after Russia had a drop in the supply. Norway has also become Western Europe’s largest oil exporter.

The cyber attack was identified as there was unusual traffic in Norway’s platform which was discovered on July 12.

Erik Hope, the head of the government agency and in charge of providing services to the ministries, said, “We identified a weakness in the platform of one of our suppliers and that weakness has now been shut”.

Norway Prognosticated in February

In February, the Nordic Police Security Agency (PST) was taking necessary precautions for a cyber attack in response to the war between Russia and Ukraine.

The PST said, ”Moscow would likely prioritize actions such as illegal gathering of intelligence, theft of information, cyber operations or cultivating sources, these are more probable”.

As predicted, there was a Distributed Denial-of-service (DDoS) attack against Norway’s state sector in June 2022, which was to be blamed on a “Criminal Russian pro group”.

However, the recent cyber attack did not affect the Prime Minister’s Office, including ministries like Foreign, Defense, and Justice, as they were using a different IT platform.

Norway is NATO’s northernmost member. Cyber attacks against Norway have seen massive increases between 2019 and 2021. The incidents stayed at the same level in 2022. Norway has increased military alerts ever since the war in Ukraine.

The tensions between the two nations remain in the same stage, affecting the neighboring countries and other nations.

However, cyber-attacks have seen a large increase in recent times and are predicted to increase furthermore. 

Peace must prevail between the two nations, which will contribute a lot of good towards humanity and a great benefit for the neighboring nations and the world.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...