pro russian hackers attack belgium

Pro-Russian hackers released a crippling wave of digital attacks against Belgium’s government websites on March 24, 2025. The notorious group NoName057 claimed responsibility, brazenly announcing on Telegram that they were targeting “Russophobic Belgium” as revenge for the country’s €1 billion aid package to Ukraine. Talk about holding a grudge.

The attacks employed a classic Distributed Denial of Service (DDoS) method, fundamentally flooding government servers with so many requests they couldn’t function. MyGov.be collapsed. The Walloon Parliament website? Gone. Brussels government sites? Down. Citizens needing official documents were out of luck.

The digital tsunami swamped Belgium’s online presence, leaving citizens stranded in a sea of error messages.

This isn’t NoName057’s first Belgian rodeo. They hit municipal websites in October 2024, just before local elections. Five straight days of attacks. They’re persistent, you’ve got to give them that.

The Centre for Cybersecurity Belgium jumped into action, activating emergency protocols and restoring most websites within hours. These attacks represent another instance of the pro-Russian cyberattacks that have increasingly targeted European nations supporting Ukraine. The incident reinforces why the U.S. and European nations are investing in international collaboration to address cross-border cyber threats. No data theft occurred—just good old-fashioned digital vandalism designed to cause chaos. Mission accomplished, I guess.

Officials have warned citizens to prepare for potential follow-up attacks. The timing couldn’t be worse with municipal and provincial elections approaching on October 13. Hilde Crevits assured voters that electronic voting machines can’t be hacked since they’re not connected to the internet. Let’s hope she’s right.

These attacks highlight the fragile nature of our digital infrastructure. Prime Minister Alexander De Croo firmly stated that these cyberattack attempts cannot interfere with the upcoming elections. What once seemed like sci-fi—cyber warfare—is now just Tuesday’s news. The lines between state actors and rogue hacktivists grow blurrier by the day.

Belgium’s experience serves as a stark reminder of the changing battlefield in the Russia-Ukraine conflict. Countries supporting Ukraine are finding themselves targets, not of missiles, but of keyboards and code. It’s low-effort, high-impact warfare, and it’s here to stay.

For now, Belgium’s websites are back online. The system-wide audit continues. And somewhere, NoName057 is probably planning their next move.

You May Also Like

Mirrorface Expands Its Cyber Reach: a Dangerous Shift From Japan to Europe

While Japan slept, MirrorFace pivoted to Europe—wielding revamped malware and erasing their tracks with chilling precision. Their Operation RedDragon reveals how nation-state hackers evolve beyond borders.