52
submitted 1 day ago by [email protected] to c/[email protected]

Archived

Chinese efforts to spy on the Dutch are intensifying, with the focus on semiconductors, Dutch Defence Minister Ruben Brekelmans said on Saturday.

"The semiconductor industry, which we are technologically leading, or technology advanced, of course, to get that intellectual property - that's interesting to China," Brekelmans said in an interview on the sidelines of the Shangri-La Dialogue security meeting in Singapore.

[...]

When asked if the spying had stopped, Brekelmans said: "It's continuing. In our newest intelligence reports, our intelligence agency said that the biggest cyber threat is coming from China, and that we do see most cyber activity when it comes to us being as from China. That was the case last year, but that's still the case. So we only see this intensifying."

[...]

Dutch intelligence agencies first publicly attributed cyber espionage to China last year, when they said state-backed cyber spies had gained access to a Dutch military network in 2023.

Brekelmans said security is becoming increasingly important for the Netherlands as China is "using their economic position for geopolitical purposes and also to pressure us".

[...]

The minister said the Netherlands has introduced instruments to protect key industries and vital interests but the country and region also need to reduce their dependency on China for critical raw materials.

"Both on the European Union level, but also on the national level, we need to make bigger steps in order to reduce those dependencies."

top 3 comments
sorted by: hot top new old
[-] [email protected] 5 points 1 day ago

Im shocked by the amount of cyber attacks in the western world, I thought that by now attacks would have subsided because of cyber security

[-] [email protected] 4 points 1 day ago

A while back I read an article on Chinese hackers, who seem to be organised very different to western hackers. Basically hacking in China is only illegal if it is against 'national interest', so governments (even local cities) hire hackers to find out information on local criminals (I guess also on anyone who disagrees with the state, but that aside). So there is much more financial incentive to hack individuals, there is more people doing it.

Hacking these individuals is basically only possible because of vulnerabilities in non-chinese software (since Chinese software and online services don't need to be hacked since the government already has a backdoor anyway). These firms share these vulnerabilities among each other as in I give you mine if you give me yours. So there a bunch of people in the know about these vulnerabilities even more so because there is a law you have to report these vulnerabilities to the state (because otherwise you are against the 'national interest').

The article was about these Chinese firms, not about the cyber safety of non-chinese citizens but I guess knowledge of these vulnerabilities could also be sold to Russians, Iranian and North-Koreans who have their own reasons to attack European, Israeli and US companies.

Tldr, more knowledge of vulnerabilities leads to more abuse of these vulnerabilities. Securing against this abuse is a cat and mouse game and neither is dead yet.

[-] [email protected] 3 points 1 day ago* (last edited 1 day ago)

Over the decades, we've been kind of casual about computer security, when you consider that we've connected up a lot of the world's computers and put a lot of pretty vital information on those networks.

I mean, we have unmaintained devices sitting on networks. It's hard for most users to pick up on a compromised system; IDSes aren't typically deployed on home networks. Most software running on personal computers doesn't run isolated; if you execute code, it has access to all your data and can reconfigure your environment. There are credentials floating around all over the place. A lot of weight is placed on keeping someone from getting into a LAN/WAN, but the larger the network, the more potential holes. There are very big supply chains that have a lot of potential attack vectors.

The other day I was commenting on how many pieces of software I've purchased in Steam. Those aren't even open-source, and one way one might get more revenue out of a game that is no longer selling many copies is to sell it to another publisher (which also tends to happen if a publisher goes under). Such a product isn't just a game, but access to be able to install software on anyone's computer who has the game installed. Some people have isolated Steam (with some level of compatibility issues) using flatpak on Linux, but individual games aren't isolated, and I doubt that most people have even that level of isolation.

And then there's all the IoT devices out there that aren't necessarily maintained or where random company out there can push updates to said devices and where their ability to push updates is something that might have commercial value.

Not to mention the question of how well all of these companies have secured their own networks and supply chains.

A lot of hard-to-solve problems there, I think.

this post was submitted on 31 May 2025
52 points (96.4% liked)

Europe

6026 readers
976 users here now

News and information from Europe 🇪🇺

(Current banner: La Mancha, Spain. Feel free to post submissions for banner images.)

Rules (2024-08-30)

  1. This is an English-language community. Comments should be in English. Posts can link to non-English news sources when providing a full-text translation in the post description. Automated translations are fine, as long as they don't overly distort the content.
  2. No links to misinformation or commercial advertising. When you post outdated/historic articles, add the year of publication to the post title. Infographics must include a source and a year of creation; if possible, also provide a link to the source.
  3. Be kind to each other, and argue in good faith. Don't post direct insults nor disrespectful and condescending comments. Don't troll nor incite hatred. Don't look for novel argumentation strategies at Wikipedia's List of fallacies.
  4. No bigotry, sexism, racism, antisemitism, islamophobia, dehumanization of minorities, or glorification of National Socialism. We follow German law; don't question the statehood of Israel.
  5. Be the signal, not the noise: Strive to post insightful comments. Add "/s" when you're being sarcastic (and don't use it to break rule no. 3).
  6. If you link to paywalled information, please provide also a link to a freely available archived version. Alternatively, try to find a different source.
  7. Light-hearted content, memes, and posts about your European everyday belong in [email protected]. (They're cool, you should subscribe there too!)
  8. Don't evade bans. If we notice ban evasion, that will result in a permanent ban for all the accounts we can associate with you.
  9. No posts linking to speculative reporting about ongoing events with unclear backgrounds. Please wait at least 12 hours. (E.g., do not post breathless reporting on an ongoing terror attack.)
  10. Always provide context with posts: Don't post uncontextualized images or videos, and don't start discussions without giving some context first.

(This list may get expanded as necessary.)

Posts that link to the following sources will be removed

Unless they're the only sources, please also avoid The Sun, Daily Mail, any "thinktank" type organization, and non-Lemmy social media. Don't link to Twitter directly, instead use xcancel.com. For Reddit, use old:reddit:com

(Lists may get expanded as necessary.)

Ban lengths, etc.

We will use some leeway to decide whether to remove a comment.

If need be, there are also bans: 3 days for lighter offenses, 7 or 14 days for bigger offenses, and permanent bans for people who don't show any willingness to participate productively. If we think the ban reason is obvious, we may not specifically write to you.

If you want to protest a removal or ban, feel free to write privately to the primary mod account @[email protected]

founded 11 months ago
MODERATORS