State-sponsored Russian hackers, identified as NoName057(16), launched a large-scale DDoS attack on multiple key Belgian websites, including MyGov.be and the Walloon Parliament’s platform. The attackers targeted these sites with overwhelming traffic, causing disruptions but no data breaches. Belgium’s Centre for Cybersecurity (CCB) monitored the situation closely, informing the affected organizations, which quickly restored most websites by the afternoon. Despite the impact, the CCB stated the attacks did not compromise internal services or data integrity.
The hacker collective NoName057(16) claimed responsibility for the attack, citing Belgium’s €1 billion military aid to Ukraine as their motivation. The group, which has previously targeted Belgian government sites, continues to disrupt services as part of a broader campaign against countries supporting Ukraine. This attack is part of an ongoing effort by Russia-aligned hacktivists to retaliate against nations offering military and financial support to Ukraine. NoName057(16) previously targeted Belgian sites in 2023 and other European nations.
DDoS attacks, although not dangerous in terms of data theft, create significant inconvenience by flooding websites with fake traffic.
These attacks prevent users from accessing the targeted sites, affecting both public services and private platforms. The Belgian government and CCB have been working to mitigate these disruptions, with limited success in preventing some sites from being temporarily offline. The Walloon Parliament confirmed that the attack was aimed at disrupting online services without causing lasting damage.
Belgium’s vulnerability to cyberattacks is highlighted by its strategic position within Europe and proximity to NATO headquarters.
As a result, the country faces frequent threats from Russian-backed hackers who view Belgium’s international stance as hostile. The ongoing cyber campaign against Belgium underscores the increasing use of cyber warfare in geopolitical conflicts. The Belgian government, in collaboration with cybersecurity experts, continues to monitor the situation and strengthen its defenses to prevent further incidents.
Reference: