logo
Dutch spies say Russian hackers targeted police

Dutch spies say Russian hackers targeted police

Time of India27-05-2025

Representative Image (AI)
THE HAGUE: A previously unknown Russian hacking group known as "Laundry Bear" was behind attacks last year on Dutch police, intelligence services in the Netherlands said Tuesday, with sensitive work-related data stolen.
The attack last September was part of a wider campaign by the Russian hackers against Western and Nato targets, according to an investigation by Dutch security and intelligence services AIVD and MIVD.
"We have seen that this hacker group successfully gains access to sensitive information from a large number of (government) organisations and companies worldwide," said MIVD director Peter Reesink.
"They have a specific interest in countries of the European Union and Nato," he added.
Laundry Bear hackers have targeted armed forces, governments and defence contractors as well as IT and service providers in several countries, the Dutch authorities said.
They have also tried to hit Dutch high-tech firms producing systems unavailable in Russia due to Western sanctions.
The investigation showed that Laundry Bear was "highly probably a Russian state-supported threat actor", the agencies said in their statement.
by Taboola
by Taboola
Sponsored Links
Sponsored Links
Promoted Links
Promoted Links
You May Like
Buy Brass Idols - Handmade Brass Statues for Home & Gifting
Luxeartisanship
Buy Now
Undo
The Dutch authorities also decided to expose the technical methods the hackers used to infiltrate systems, hoping this would allow for better defence.
"This limits Laundry Bear's chances of success and digital networks can be better protected," said AIVD chief Erik Akerboom.
"This increases our national resilience," he added.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Just protecting borders from drone attacks isn't enough. Look at Ukraine & Russia
Just protecting borders from drone attacks isn't enough. Look at Ukraine & Russia

The Print

timean hour ago

  • The Print

Just protecting borders from drone attacks isn't enough. Look at Ukraine & Russia

Military analysts are also comparing it to the Israeli pager attack, a covert operation executed by Israeli intelligence services, against Hezbollah in September 2024. This operation, dubbed 'Operation Grim Beeper', involved the strategic detonation of thousands of pagers and walkie-talkies used by Hezbollah operatives in Lebanon and Syria. A common factor in both these attacks is their sheer unconventionality, adding yet another dimension to the concept of asymmetric, kinetic, non-contact warfare. On 1 June 2025, Ukraine launched a coordinated drone strike targeting five major Russian airbases using drones that were smuggled into Russia in shipping containers disguised as construction material. Utilising 117 drones, the Ukrainian forces executed a surprise attack deep within Russian territory, the deepest being over 4,000 km from Ukraine, which is more than the length or breadth of India. The operation resulted in the destruction of several aircrafts, including strategic bombers such as the Tu-22 and Tu-95, which are vital to Russia's long-range and nuclear capabilities. Operation Spider's Web, Ukraine's recent drone attacks on Russian airfields, has significantly disrupted Russia's military capabilities and sent a strong message not only regarding Ukraine's evolving warfare strategies but also to armies worldwide on the growing drone threat. It is abundantly evident that India needs to be quick on the draw if it is to forestall similar attacks within our own territory. Our Integrated Air Defence System (IADS) worked well to neutralise Pakistani drone attacks during Operation Sindoor, but these defensive measures were focused on the areas bordering Pakistan. We are surrounded by inimical countries or countries that harbour terror groups. Given these realities, our vital installations are no more than a few hundred km from any border, making the institution of 360-degree preventive and precautionary measures all the more urgent. Also read: Threats to India are not over. Why it must build fortress-like defences Countering drone attacks against targets in the hinterland, such as airfields, will involve a combination of technology, tactics, and infrastructural flexibility. Some of the measures that need to be initiated are: Integrated sensor networks: Deploying a combination of radar, radio frequency (RF) detectors, and optical sensors to create a comprehensive surveillance system. An upgraded IADS network is needed to detect, track, and classify drones at various ranges, providing multi-directional early warning and situational awareness over the entire Indian airspace. Geofencing: Implementing virtual boundaries around critical areas that trigger alerts when unauthorised drones enter restricted zones. Enhanced geofencing using 3D modeling to adapt to terrain and operational needs will offer a dynamic defence perimeter, without curtailing own operational freedom. Radio frequency Jamming: Utilising directional RF jammers to disrupt communications between a drone and its operator, causing the drone to return to its launch point or land. However, this method is effective only against drones relying on RF links, and not on pre-programmed ones. Microwave and DEW: High-Power Microwave (HPM) systems that emit concentrated microwave pulses to disable drone electronics are particularly effective against drone swarms due to their ability to engage multiple targets simultaneously. Radio Frequency Directed Energy Weapons (RFDEWs) systems, on the other hand, emit targeted RF energy to disrupt or damage the electronic components of drones, offering a cost-effective and scalable solution for the defence of military bases and other large, vulnerable areas. The Defence Research and Development Organisation (DRDO), which is already working on such projects, should fast-track the development of these systems. Anti-Drone mesh or Cope cages: Installing metal lattice structures around aircraft and critical infrastructure/assets can physically prevent drones from making direct contact, reducing the risk of damage from explosive or kinetic impacts. However, the protective value of such cages is limited, especially when sensitive equipment is involved. A better alternative would be to have hardened shelters or, better still, move everything underground. Using low-tech alternatives like smokescreens to obscure the view for first-person view (FPV) drones is also possible. Quick Reaction Teams (QRTs): Designating specialised trained units like the Air Force's 'Garuds' or the National Security Guard (NSG) to respond to drone threats would enable swift action to neutralise or mitigate attacks. Each military installation will have to institute a system of 'look-outs' who can sound the alarm the moment an unidentified flying object is spotted. Training and preparedness: Regular drills and training programmes for personnel to enhance readiness and ensure an effective response to drone incursions. This includes familiarisation with detection systems, engagement protocols, and coordination procedures. The support of the local population, who can act as 'spotters' and civil-military cooperation, will be vital. Implementing a combination of these measures can significantly enhance the defensibility of airfields and critical infrastructure against drone threats, even in the depth areas far from the frontlines. Equally important, though, are some of the measures that have to be taken in the civilian domain, by the government. What these drone attacks have magnified is that there is no classical front line and that the entire country is the battlefield. That being so, many rules and regulations that have been ignored for want of legislation or political expediency need to be looked at. The declaration of 'no-fly zones' in the vicinity of vulnerable areas needs to be notified and made a punishable offence, inviting severe penalties under the National Security Act, and not treated merely as a minor civil offence. The restrictions on construction near the periphery of military installations need to be strictly followed. As things stand now, the Ministry of Defence (MoD) guidelines under the Works of Defence Act 1903 are being blatantly violated. Even when violations are observed and reported, they are dismissed by local authorities, including the courts and police, in sympathy with the local population. In one instance, the Karnataka High Court even issued orders to ignore the MoD guidelines in a case about construction activities. This short-sighted approach to matters of national security can have far-reaching, catastrophic consequences. Civil multi-story buildings hugging the boundary walls from where attacks on specific targets and personnel can be launched and controlled by FPV drones present a very real and potent danger. Due attention also needs to be paid to the multitude of drone and anti-drone companies that have proliferated in the last few years. It must be made mandatory for all such companies to register themselves and provide details of their manufacturing or assembly capacities, with a record of sales and verified end-users. An underground market for drones cannot be allowed to flourish. All drones need to be registered at the nearest police station, including their technical parameters. Unauthorised possession or sale of drones needs to be made an offence through suitable legislation, on the lines of the Arms Act. All agencies need to work seamlessly to deal with this emerging threat. Ukraine's drone attack on Russian airfields has been described as Russia's Pearl Harbour moment. The US suffered significant losses after Japan's surprise attack on its Pacific fleet, as has Russia now. However, let us not forget that the US survived and, through the wrecks of sunken ships, rose and won the war. What the future portends is unclear, but we need to prepare for all eventualities. Forewarned is forearmed. General Manoj Mukund Naravane PVSM AVSM SM VSM is a retired Indian Army General who served as the 28th Chief of the Army Staff. Views are personal. (Edited by Ratan Priya)

Russian intelligence says it collects WeChat data: What does that mean?
Russian intelligence says it collects WeChat data: What does that mean?

Indian Express

time3 hours ago

  • Indian Express

Russian intelligence says it collects WeChat data: What does that mean?

Russian counterintelligence agents are analyzing data from the popular Chinese messaging and social media app WeChat to monitor people who might be in contact with Chinese spies, according to a Russian intelligence document obtained by The New York Times. The disclosure highlights the rising level of concern about Chinese influence in Russia as the two countries deepen their relationship. As Russia has become isolated from the West over its war in Ukraine, it has become increasingly reliant on Chinese money, companies and technology. But it has also faced what the document describes as increased Chinese espionage efforts. The document indicates that the Russian domestic security agency, known as the FSB, pulls purloined data into an analytical tool known as 'Skopishche' (a Russian word for a mob of people). Information from WeChat is among the data being analyzed, according to the document. The document offers insights into the espionage tactics of two authoritarian governments that are preoccupied with surveillance. According to the document, the system processes detailed data on WeChat users, including account logins, contact lists and message archives, some of which are extracted from phones seized from people of interest to Russia's spy hunters. The tool is used to scrutinize the data trail of 'people using the Chinese messenger WeChat to talk to representatives of the PRC intelligence services,' the document says, using the abbreviation for the People's Republic of China. The exact functionality of the system is unclear. It is described in Russian as an automated data processing system that can be used in 'search activities.' Intelligence agencies typically use such tools to map messenger and social network connections to spot potential spies. The document makes clear that the FSB is particularly interested in WeChat. The Russian security agency asks field officers to send WeChat accounts and logins of interest to the China counterintelligence team, including 'lists of contacts (logins) and archives of chats from WeChat obtained during direct access to the smartphones of targets of interest.' The document says data can be run through another automated system, known as Laretz, a Russian word for a small decorated box, that can check 'more than a thousand electronic indicators simultaneously.' The Times was unable to confirm whether Skopishche had been effective as a counterintelligence tool or how extensively the FSB could intercept data from WeChat. One Western intelligence agency told the Times that the information in the document was consistent with what it knew about 'Russian penetration of Chinese communications.' The FSB and the Chinese Foreign Ministry did not reply to requests for comment. WeChat, owned by the Chinese tech giant Tencent, is one of the most widely used digital platforms in the world, mostly concentrated in China and among Chinese communities. It functions as an all-in-one tool that combines messaging, mobile payments, social networking and government services. The app has over 1.4 billion users globally, according to Tencent financial disclosures. Tencent did not reply to a request for comment. Russian intelligence agencies have worked to penetrate encrypted communication apps like Signal and WhatsApp. The FSB has have long viewed those apps, which are widely used by dissidents, as tools of subversion and foreign influence. In April, President Vladimir Putin of Russia barred government and bank employees from using foreign messaging apps. WeChat is different. By design, it does not use end-to-end encryption to protect user data. That is because the Chinese government exercises strict control over the app and relies on its weak security to monitor and censor speech. Foreign intelligence agencies can exploit that weakness, too. WeChat added some limited encryption features in 2016, according to Mona Wang, a research fellow at the University of Toronto's Citizen Lab. But the security improvements still fall short of the encryption offered by other messaging apps like Signal or WhatsApp. It is unclear why Chinese intelligence officers would use WeChat to communicate with sources, given its lack of end-to-end encryption. But sources or potential recruits may not know they are communicating with spies, who often pose as diplomats and strike up casual conversations at first. WeChat was briefly banned in Russia in 2017, but access was restored after Tencent took steps to comply with laws requiring foreign digital platforms above a certain size to register as 'organizers of information dissemination.' The Times confirmed that WeChat is currently licensed by the government to operate in Russia. That license would require Tencent to store user data on Russian servers and to provide access to security agencies upon request. Russia is separately pursuing a government messaging app of its own, one that has drawn comparisons to WeChat.

‘Silent Enemy', ‘Dangerous Adversary': What Russia's Spy Files Reveal About Its Best Friend China
‘Silent Enemy', ‘Dangerous Adversary': What Russia's Spy Files Reveal About Its Best Friend China

India.com

time8 hours ago

  • India.com

‘Silent Enemy', ‘Dangerous Adversary': What Russia's Spy Files Reveal About Its Best Friend China

Moscow, New York, New Delhi: While Vladimir Putin sings praises of an 'unbreakable friendship' with China, a leaked internal document from Russia's top security agency paints a very different picture – one that could shatter illusions of brotherhood between the two authoritarian giants. In the damning eight-page report leaked from the Russian Federal Security Service (FSB), Beijing is labelled not as a partner, but as a 'dangerous adversary' silently undermining Moscow from within. According to the classified files accessed by The New York Times, the FSB has sounded alarm bells over China's growing espionage operations. The document accuses the country of covertly recruiting Russian agents, targeting disillusioned scientists, stealing sensitive military technologies and snooping on Russian Arctic expeditions – right under Moscow's nose. The timing of the leak could not be more dramatic. As Putin wages war in Ukraine and leans on China to survive Western sanctions, these revelations hit like a geopolitical thunderclap. The FSB report warns that Chinese operatives are using mining companies and academic partnerships as cover to gather intelligence and assert long-term claims on Russian territory, especially in the Arctic – a resource-rich zone Moscow considers its strategic jewel. Even more shocking, the document alleges that China has been spying on Russian troop movements in Ukraine to extract battlefield data to study Western weapon systems in action. Secret Spy File Leaked by Hackers Lacking a date, the FSB document is believed to have been drafted in late 2023 or early 2024. It was leaked by a hacking group known as Ares Leaks and later verified by The New York Times after consulting six Western intelligence agencies – all of whom confirmed its authenticity. While Moscow has stayed publicly mum, the leak is one of the strongest indicators that show that the trust between Russia and China may be a facade. The report outlines clear counter-espionage priorities aimed at stopping Chinese infiltration. It signals deep-rooted mistrust behind the scenes. Friends with Benefits? China and Russia have portrayed a united front. Since the Ukraine invasion, Beijing has bought up discounted Russian oil and gas, propped up Moscow's collapsing tech supply chains with chips and software and filled the vacuum left by fleeing Western companies. The two nations have even discussed joint moon bases and co-producing films. But the FSB's own assessment makes it clear that the so-called 'friendship without limits' may in fact be a marriage of convenience and an increasingly toxic one at that. As China continues to rise and Russia bleeds in Ukraine, Putin's trust in Xi might soon cost him more than just military secrets. It could unravel one of the world's most strategically fragile alliances. Russia and China may smile in public but in the shadows, the knives are already out.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store