top of page
perceptive_background_267k.jpg

Dutch Finance Ministry takes treasury banking portal offline after breach

Published:

31 maart 2026 om 07:52:15

Alert date:

31 maart 2026 om 08:01:15

Source:

bleepingcomputer.com

Click to open the original link from this advisory

Data Breach & Exfiltration, Critical Infrastructure

The Dutch Ministry of Finance has taken multiple systems offline, including their digital treasury banking portal, following the detection of a cyberattack that occurred two weeks prior. The ministry is currently investigating the breach and has proactively shut down affected systems as a security measure. The incident impacts critical government financial infrastructure and treasury operations. The breach was discovered during routine security monitoring and the ministry has initiated incident response procedures. No additional details about the attack vector, scope of compromise, or potential data exposure have been disclosed at this time.

Technical details

The Dutch Ministry of Finance detected a cyberattack on March 19 and took systems offline on March 23 for security reasons. The breach affected employee data but did not impact tax collection, income-linked subsidies, or import/export regulation systems. The digital portal for treasury banking was taken offline, affecting approximately 1,600 public institutions' ability to view account balances, apply for loans/deposits/credit, change intraday limits, or generate reports. Payment processing continues through regular banking channels.

Mitigation steps:

The ministry is conducting forensic investigation with Dutch National Cyber Security Center (NCSC) and external forensic experts. They have notified the Dutch Data Protection Authority (AP) and filed a report with Dutch national police High Tech Crime Team. Systems remain offline for security reasons while maintaining minimum service levels manually for essential processes.

Affected products:

Dutch Ministry of Finance treasury banking portal
Dutch Ministry of Finance digital systems

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page