Dutch Prison Agency Data Exposed for Five Months in Wider Government Hack

Hackers Maintained Access to Dutch Prison Agency (DJI) Systems for Five Months, Exposing Staff Data

HIGH
February 28, 2026
5m read
Data BreachCyberattackThreat Intelligence

Related Entities

Organizations

Dienst Justitiële Inrichtingen (DJI)Autoriteit Persoonsgegevens (AP)Raad voor de RechtspraakNational Cyber Security Centre (NCSC)

Full Report

Executive Summary

An investigation by the Dutch radio program Argos has uncovered a severe and prolonged data breach at the Netherlands' prison agency, the Dienst Justitiële Inrichtingen (DJI). Threat actors reportedly maintained access to the agency's systems for at least five months, exfiltrating sensitive data belonging to staff members. The compromised information includes email addresses, phone numbers, and security certificates, creating a significant risk of extortion and blackmail for government employees. The breach also extended to mobile devices like phones and tablets. This incident is confirmed to be part of a larger campaign that also impacted other Dutch government entities, including the data protection authority (Autoriteit Persoonsgegevens) and the judiciary council (Raad voor de Rechtspraak). The Dutch National Cyber Security Centre (NCSC) is actively involved in the ongoing investigation.


Threat Overview

The prolonged five-month dwell time indicates a stealthy and persistent adversary. The breach was not a simple smash-and-grab but a sustained intrusion. The full scope of access is still under investigation, but it is known that attackers successfully compromised staff contact details and security certificates. The theft of security certificates is particularly alarming, as they could be used to impersonate legitimate services or decrypt communications.

The fact that this was part of a broader attack targeting multiple government bodies suggests a well-resourced and motivated threat actor, possibly a nation-state group, aiming to gather intelligence or cause disruption across the Dutch government. Staff were officially notified on February 12, 2026, following an external investigation. The agency has advised employees to disable location services on their devices as a precaution, indicating a concern that location data may also have been compromised.

Technical Analysis

While the root cause and initial access vector are still being investigated, the long dwell time and multi-agency impact suggest a sophisticated attack.

Potential Attack Chain & TTPs

  1. Initial Access: Given the government targets, likely vectors include a zero-day exploit in a public-facing application (T1190 - Exploit Public-Facing Application) or a highly targeted spearphishing campaign (T1566 - Phishing).
  2. Persistence (T1078 - Valid Accounts): To maintain access for five months, the attackers likely obtained and used valid credentials, possibly escalating privileges to create new accounts or install backdoors.
  3. Credential Access (T1555 - Credentials from Password Stores): The attackers gained access to phones, tablets, and laptops. They likely attempted to dump credentials stored on these devices.
  4. Collection (T1560 - Archive Collected Data): The attackers collected specific, high-value data: staff contact lists and security certificates.
  5. Exfiltration (T1048 - Exfiltration Over Alternative Protocol): Data was exfiltrated over a covert channel to avoid detection by network security monitoring.

The compromise of multiple, seemingly separate government agencies points towards a potential compromise of a shared service provider or a common software platform used across the Dutch government, representing a significant supply chain risk.

Impact Assessment

The impact of this breach is severe, with potential long-term consequences for national security and the safety of government employees.

  • Personnel Risk: The exposure of prison staff contact information places them at high risk of targeted harassment, intimidation, blackmail, or physical threats from criminals or their associates.
  • Espionage and Blackmail: Foreign intelligence services could use this data to identify and coerce government employees into providing sensitive information.
  • Loss of Trust in Government IT: A prolonged, multi-agency breach erodes public and internal confidence in the government's ability to protect its own data.
  • Systemic Risk: The theft of security certificates could allow attackers to conduct man-in-the-middle attacks, impersonate government websites, or undermine the integrity of secure communications.

Detection & Response

Detecting a patient, sophisticated adversary requires deep and continuous monitoring.

Detection Strategies

  • Endpoint Detection and Response (EDR): Deploying EDR across all endpoints (including servers and laptops) is crucial for detecting the subtle signs of compromise, such as unusual process execution or credential access attempts (e.g., access to LSASS memory).
  • Log Auditing (M1047 - Audit): Centralized logging and continuous monitoring of authentication logs, VPN logs, and access logs from all agencies can help identify patterns of lateral movement or anomalous access that might be missed when looking at a single agency in isolation.
  • Threat Hunting: Proactively hunt for signs of compromise, assuming the adversary is already inside. This includes searching for known TTPs of nation-state actors, looking for unusual scheduled tasks, or analyzing network traffic for faint C2 beacons.

Mitigation

  • Multi-Factor Authentication (M1032 - Multi-factor Authentication): Enforce phishing-resistant MFA for all remote access and access to sensitive systems to make credential theft more difficult.
  • Network Segmentation (M1030 - Network Segmentation): Implement strong network segmentation between government agencies and between different security zones within an agency. This can contain a breach and prevent an attacker from easily moving from one target to another.
  • Endpoint Hardening: Harden endpoints by restricting administrative privileges, implementing application allowlisting, and disabling unnecessary services.
  • Certificate Management: Implement robust certificate lifecycle management, including monitoring for unauthorized issuance and having a plan to quickly revoke and reissue compromised certificates.

Timeline of Events

1
February 12, 2026
Staff at the Dutch prison agency (DJI) were informed of the data leak after an external investigation.
2
February 27, 2026
The breach and its five-month duration are publicly reported.
3
February 28, 2026
This article was published

MITRE ATT&CK Mitigations

Audit

M1047enterprise

Implement comprehensive and centralized logging across all agencies to enable effective threat hunting and incident investigation.

Mapped D3FEND Techniques:

Enforce strong MFA for all user accounts, especially for remote access and access to sensitive systems, to mitigate the impact of credential theft.

Mapped D3FEND Techniques:

Strongly segment networks to prevent lateral movement between different government agencies and contain breaches.

Mapped D3FEND Techniques:

Sources & References

Hackers had access to prison staff data for five months: Argos
DutchNews.nl (dutchnews.nl) February 27, 2026
Cyber Briefing by Cyber Material
YouTube (youtube.com) February 27, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

governmentAPTlong-term persistencedwell timeespionageblackmailsecurity certificates

📢 Share This Article

Help others stay informed about cybersecurity threats