Monday, May 19, 2025
HomeCyber Security NewsDutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Published on

SIEM as a Service

Follow Us on Google News

Multiple Dutch organizations have experienced significant service disruptions this week due to a series of coordinated Distributed Denial-of-Service (DDoS) attacks.

These attacks, which have also targeted other European organizations, are believed to be the work of a pro-Russian hacktivist group NoName057(16), according to official statements and ongoing investigations by the National Cyber Security Centre (NCSC).

Wave of Disruptions Across Public and Private Sectors

Both public and private sector organizations in the Netherlands have fallen victim to these large-scale DDoS attacks.

- Advertisement - Google News

The primary objective of a DDoS attack is to overload online services, servers, or crucial network equipment with an overwhelming volume of traffic.

The result, websites and digital systems become slow or completely inaccessible, cutting off users from vital information and essential services.

For many organizations reliant on online operations, these disruptions pose serious operational challenges. Users have reported difficulties in logging into accounts, accessing services, and obtaining information.

While these attacks disrupt normal service provision, cybersecurity experts reassure the public that DDoS attacks do not involve breaches or theft of sensitive data; the integrity and confidentiality of personal data remain intact.

Attributing DDoS attacks to specific individuals or groups is notoriously difficult. However, several of this week’s incidents have been publicly claimed by the Russian-affiliated hacktivist collective NoName057(16).

Cybersecurity analysts suggest that the attacks are ideologically motivated and align with broader pro-Russian cyber disruption campaigns targeting European infrastructure amid ongoing geopolitical tensions.

The Dutch NCSC is actively monitoring the situation in collaboration with national and international partners.

The agency has intensified its vigilance regarding hacktivist activity, especially actors like NoName057(16).

Where possible, the NCSC is notifying potential future targets and guiding mitigation strategies, helping organizations reduce their vulnerability and respond more effectively to ongoing threats.

As the situation develops, the NCSC continues its investigation and information sharing, underscoring the importance of collective vigilance and preparedness in the face of evolving cyber threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...