Share this article on:
The Dutch National Police has disclosed a cyber attack that has compromised the data of all police officers, with investigations to date suggesting a state-sponsored threat actor could be behind it.
On Sunday (6 October), the police disclosed that threat actors had exfiltrated the work-related contact data of its entire police force, including names, email addresses and phone numbers.
“I have spoken to many colleagues in recent days who had questions and concerns. Concerns that I share, because in order to provide safety outside, you have to feel safe inside,” wrote Police Chief Janny Knol.
According to Europol, the Netherlands has 65,000 total employees, including 51,000 police officers and 14,000 employees “who fulfil other roles which support police work”.
Initially, as per a 26 September letter to the Dutch House of Representatives by the Minister for Justice and Security, the incident did not result in a risk to personal data; however, the Dutch National Police has since said that, while not in all cases, some of those affected had “private information” stolen as well.
The Dutch National Police added that the data stolen belongs only to current officers and those who recently retired; however, some external partners, such as those who work on the judicial council or in public prosecution, could be at risk.
“If you resigned before July 24, 2024, your data was not involved in the hack,” it said.
“External persons whose data may have been leaked have received an email. The organisations they are part of have also been informed.”
According to investigations to date, the police have said that the hacker behind the breach is “very likely a state actor” but did not disclose who they suspected was the culprit.
“Based on the information from the intelligence services, the police immediately implemented strong security measures against this attack,” added the Dutch National Police.
“In order not to make the perpetrators any wiser and not to harm further investigation, no more can be said at this time.”
Those affected have been advised to be on the lookout for attempts at further access, such as through phishing emails, phone calls, and other suspicious activity.