Thursday, April 17, 2025
HomeCyber Attack12 Norway Government Ministries were Targeted in a Cyberattack

12 Norway Government Ministries were Targeted in a Cyberattack

Published on

SIEM as a Service

Follow Us on Google News

According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks.

The most recent attack was aimed at Norway’s public sector, and investigations are currently ongoing.

Norway has been Europe’s largest gas supplier after Russia had a drop in the supply. Norway has also become Western Europe’s largest oil exporter.

- Advertisement - Google News

The cyber attack was identified as there was unusual traffic in Norway’s platform which was discovered on July 12.

Erik Hope, the head of the government agency and in charge of providing services to the ministries, said, “We identified a weakness in the platform of one of our suppliers and that weakness has now been shut”.

Norway Prognosticated in February

In February, the Nordic Police Security Agency (PST) was taking necessary precautions for a cyber attack in response to the war between Russia and Ukraine.

The PST said, ”Moscow would likely prioritize actions such as illegal gathering of intelligence, theft of information, cyber operations or cultivating sources, these are more probable”.

As predicted, there was a Distributed Denial-of-service (DDoS) attack against Norway’s state sector in June 2022, which was to be blamed on a “Criminal Russian pro group”.

However, the recent cyber attack did not affect the Prime Minister’s Office, including ministries like Foreign, Defense, and Justice, as they were using a different IT platform.

Norway is NATO’s northernmost member. Cyber attacks against Norway have seen massive increases between 2019 and 2021. The incidents stayed at the same level in 2022. Norway has increased military alerts ever since the war in Ukraine.

The tensions between the two nations remain in the same stage, affecting the neighboring countries and other nations.

However, cyber-attacks have seen a large increase in recent times and are predicted to increase furthermore. 

Peace must prevail between the two nations, which will contribute a lot of good towards humanity and a great benefit for the neighboring nations and the world.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

China Plans Expanded Cybersecurity Cooperation with Russia

China has announced a significant step forward in its partnership with Russia, with plans...

Ghost Ransomware Targets Organizations Across 70+ Countries

A new ransomware variant known as "Ghost" (also referred to as Cring) has emerged...

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Cybercriminals are exploiting the trust in e-gift cards and the prestige of Amazon to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

China Plans Expanded Cybersecurity Cooperation with Russia

China has announced a significant step forward in its partnership with Russia, with plans...

Ghost Ransomware Targets Organizations Across 70+ Countries

A new ransomware variant known as "Ghost" (also referred to as Cring) has emerged...