Monday, June 16, 2025
HomeCyber AttackDutch Banks are Suffering From Back to Back DDoS Attacks - Online...

Dutch Banks are Suffering From Back to Back DDoS Attacks – Online Banking Goes Offline

Published on

SIEM as a Service

Follow Us on Google News

Dutch Banks ABN Amro and Rabobank targeted by DDOS Attacks back to back on 27, May Sunday night and affecting their online banking system an sever went offline.

Cybercriminals launched heavy DDoS Attacks against two banks servers and overwhelming the traffic affected the targeted bank websites.

The Aim of DDoS Attacks is when multiple systems overflow the bandwidth or resources of a targeted system, usually one or more web servers. Such as DDOS Attack is often the result of multiple compromised systems (for example, a botnet) deluging the targeted system with traffic.

- Advertisement - Google News

The first DDOS attack was launched against Rabobank and ABN Amro last week (24, May) around 6:00 p.m that cause online and mobile banking went offline iDeal payments and websites were hard to reach for several hours

Nowadays many of the organization such as Banks, Private companies, government organizations are targeted by heavy DDOS attacks and the companies should calculate the Risk and cost of DDOS attack and always keep eyes and their network.

According to Spoke person ABN Amro, cybercriminals are jumping from one bank to the next with these attacks. “It looks like a cat-and-mouse game”

Later experts are auditing the bank’s servers and tried to regain the server and make them online after the 2nd attack on Sunday and BN Amro resolved its problems by 10:00 p.m. on Sunday.

According to nltimes, Rabobank reported that its online services are up and running around 2:00 a.m. on Monday.

“The security of Internet Banking, Mobile Banking and iDeal was never in danger”, a spokesperson for ABN Amro said, according to AD.

ABN Amro and Rabobank apologize to their customers for the inconvenience. since the DDOS attack vector is kept increasing companies should check the DDOS Attack cost based on the company strength and implement the DDOS attack prevention policies.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Fog Ransomware Uses Pentesting Tools to Steal Data and Launch Attacks

Fog ransomware incidents in recent years have exposed a dangerous new trend in cybercrime:...

JSFireTruck Obfuscation Helps Cybercriminals Hijack Trusted Sites with Malicious JavaScript

A sophisticated and extensive cyber attack campaign has been uncovered, in which threat actors...

Don’t Click “Unsubscribe” links blindly It May Leads to Loss of Credentials

Imagine your inbox is overflowing with promotional emails—some from familiar companies, others less so....