Will there be a cyberbreach of a Dutch government organization in 2023?
30
239
768
resolved Jan 10
Resolved
NO

Added:

If no hack is published by 31 January 2024 this will resolve to NO.

Added:

Between 6 May 2023 and 31 December 2023 (not retrospective) ...

Hackers break into a Dutch government organization and steal, publish or destroy confidential information. The incident will at least be published on the nos.nl newssite.

DDos does not count.

Hacking devices of a government employee and stealing the data from there does not count.

Personal errors of a government employee, like losing a USB stick does not count.

The "back end" of the government organization must be compromised.

Added:

Administrator error that does not need hacking, like leaving an Amazon bucket open, does not count.

Administrator error, like not applying patches, and then getting hacked, does count.

Get Ṁ200 play money

🏅 Top traders

#NameTotal profit
1Ṁ159
2Ṁ71
3Ṁ54
4Ṁ48
5Ṁ41
Sort by:

I was being pestered by some Manifold bot, so I resolved earlier than I had planned. No problem.

Any new revelations about 2023 will not count anymore.

There are no breaches per 10 January 2024.

Checked 24 december - 31 december 2023:

If nothing new comes to light in January 2024 the resolution will be NO:

This was a pentest, if it were a real attack it would count:

Brabantse gemeenten hebben beveiliging persoonsgegevens niet op orde - Security.NL

Insider threat, if it was a government it would count:

Erasmus MC onderzoekt ongeoorloofde inzage in dossier slachtoffer schietincident - Security.NL

I will open a similar question for 2024 soon.

I'm thinking about closing (not resolving) this bet around 20-25 december, otherwise it would be to easy. What do you think of that?

Does the breach have to be announced by December 31st? Is it the national government only, or any government organization at any level?

@dph121 Any government organization. In Dutch jargon: ZBO's, agentschappen, waterschappen, provincies, gemeenten. These all count. But, for example, not hospitals, schools and universities.

@dph121 Good question! I think I'll resolve this way:

If no hack is published by 31 January 2024 this will resolve to NO.

Checked period 14 July on to 13 september on security.nl and nos.nl

No news of a Dutch government hack by this method, although claims that some governments were hacked:

https://nos.nl/artikel/2482567-chinese-hackers-braken-in-bij-e-mailaccounts-van-overheden-in-west-europa

Privacy concern, leak, not a hack:

https://www.security.nl/posting/804510/Actiegroep+start+in+september+rechtszaak+over+verzamelen+data+ggz-pati%C3%ABnten

https://www.security.nl/posting/805661/UWV+al+in+2020+gewaarschuwd+over+illegaal+data+verzamelen+via+cookies

https://www.security.nl/posting/805317/Politie+maakt+zonder+wettelijke+basis+gebruik+van+webcrawlers

https://www.security.nl/posting/806576/Etten-Leur+stuurt+brief+naar+mogelijke+slachtoffers+van+datalek+Nebu

https://www.security.nl/posting/808370/De+Jonge+moet+opheldering+geven+over+beveiliging+gegevens+bij+Kadaster

https://www.security.nl/posting/809329/OM+erkent+fouten+bij+identificatie+van+demonstranten+via+social+media

https://nos.nl/artikel/2488620-psychiaters-beschuldigen-toezichthouder-van-ongerichte-surveillance-van-patienten

Insider threat, leak, not hack:

https://www.security.nl/posting/807215/Datalek+bij+politie+door+ontslagen+medewerker+die+telefonisch+gevoelige+informatie+opvroeg

Fraud and document countefeting, not hack:

https://www.security.nl/posting/804866/Digitale+handtekening+moet+vervalsen+rapporten+DigiD-aansluiting+tegengaan

Historic infiltration and espionage, not hack:

https://www.security.nl/posting/806629/NRC%3A+politieke+partijen+structureel+geïnfiltreerd+en+afgeluisterd+door+BVD

Governent hack, but too long ago:

https://nos.nl/artikel/2474876-gemeente-hof-van-twente-moet-miljoenenschade-na-hack-zelf-betalen

Funny hack, but not overnment:

https://nos.nl/artikel/2483313-hack-bij-bedrijf-statiegeldautomaten-problemen-bij-sommige-inleverpunten

I propose not to let this count because it did not compromise the back end and it happened in 2022:

https://www.security.nl/posting/797002/Gemeente+Asten+getroffen+door+datalek+na+inbraak+op+twee+e-mailaccounts

bought Ṁ30 of NO

hmm it would be quite something to hit all those rules. afaik a ton of hacking and security penetration is built around social techniques and human error, not raw technological force and skill

@Stralor I don't think it's that bad. If a government employee loses a USB stick or makes an error that makes a hack of the back end possible, it will count.

Getting phished and giving a hacker access to an internal share, will count.

I just want to exclude cases like: employee loses unencrypted USB stick.

predicted NO

@uair01 ah! okay at first pass I read it differently

More related questions