A surge of large-scale Distributed Denial-of-Service (DDoS) attacks has disrupted the digital infrastructure of several Dutch organizations this week, targeting both public and private sectors and extending to other European entities.
The attacks, which have rendered websites and online services temporarily inaccessible, have been attributed to the pro-Russian hacktivist group NoName057(16), who claim their actions are retaliation for Dutch military support to Ukraine.
Scope and Impact
The attacks began earlier this week, affecting at least 19 provincial and municipal websites across the Netherlands, including those in Groningen, Noord-Holland, Zeeland, Drenthe, Overijssel, Noord-Brabant, and cities such as Breda, Apeldoorn, and Tilburg.
For several hours, users were unable to access government portals, disrupting access to information and essential digital services.
Local authorities and the National Cyber Security Center (NCSC) confirmed that while service availability was impacted, there was no evidence of data breaches or compromise of internal systems.
DDoS attacks work by overwhelming targeted servers or network infrastructure with massive volumes of traffic, making online services slow or completely inaccessible.
Although disruptive, these attacks do not involve unauthorized access to systems or theft of data, and thus do not compromise the integrity or confidentiality of personal or organizational information.
Motivation and Attribution
The Russian hacktivist group NoName057(16) claimed responsibility for the attacks on their Telegram channel, citing Dutch military and financial aid to Ukraine as their motive.
The Netherlands recently sent €6 billion in aid to Ukraine and plans to allocate an additional €3.5 billion by 2026, a move the group referenced in its statements.
NoName057(16) has a history of targeting European infrastructure in response to geopolitical developments, often escalating attacks during periods of heightened tension.
Ongoing Threat and Response
The NCSC is actively investigating the incidents, coordinating with national and international partners, and monitoring hacktivist activity to warn potential targets.
The attacks are part of a broader trend in 2025, which has seen a sharp rise in both the frequency and sophistication of DDoS incidents worldwide, with attackers leveraging advanced tools and crowdsourced platforms to amplify their impact.
Authorities emphasize that organizations should remain vigilant, implement robust DDoS mitigation strategies, and maintain up-to-date incident response plans.
The NCSC continues to provide guidance and support to affected and at-risk organizations, underscoring the importance of resilience in the face of evolving cyber threats.
For more information on DDoS protection and response, organizations are encouraged to consult resources provided by the National Cyber Security Center.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates