An investigation by the Dutch radio program Argos has uncovered a severe and prolonged data breach at the Netherlands' prison agency, the Dienst Justitiële Inrichtingen (DJI). Threat actors reportedly maintained access to the agency's systems for at least five months, exfiltrating sensitive data belonging to staff members. The compromised information includes email addresses, phone numbers, and security certificates, creating a significant risk of extortion and blackmail for government employees. The breach also extended to mobile devices like phones and tablets. This incident is confirmed to be part of a larger campaign that also impacted other Dutch government entities, including the data protection authority (Autoriteit Persoonsgegevens) and the judiciary council (Raad voor de Rechtspraak). The Dutch National Cyber Security Centre (NCSC) is actively involved in the ongoing investigation.
The prolonged five-month dwell time indicates a stealthy and persistent adversary. The breach was not a simple smash-and-grab but a sustained intrusion. The full scope of access is still under investigation, but it is known that attackers successfully compromised staff contact details and security certificates. The theft of security certificates is particularly alarming, as they could be used to impersonate legitimate services or decrypt communications.
The fact that this was part of a broader attack targeting multiple government bodies suggests a well-resourced and motivated threat actor, possibly a nation-state group, aiming to gather intelligence or cause disruption across the Dutch government. Staff were officially notified on February 12, 2026, following an external investigation. The agency has advised employees to disable location services on their devices as a precaution, indicating a concern that location data may also have been compromised.
While the root cause and initial access vector are still being investigated, the long dwell time and multi-agency impact suggest a sophisticated attack.
T1190 - Exploit Public-Facing Application) or a highly targeted spearphishing campaign (T1566 - Phishing).T1078 - Valid Accounts): To maintain access for five months, the attackers likely obtained and used valid credentials, possibly escalating privileges to create new accounts or install backdoors.T1555 - Credentials from Password Stores): The attackers gained access to phones, tablets, and laptops. They likely attempted to dump credentials stored on these devices.T1560 - Archive Collected Data): The attackers collected specific, high-value data: staff contact lists and security certificates.T1048 - Exfiltration Over Alternative Protocol): Data was exfiltrated over a covert channel to avoid detection by network security monitoring.The compromise of multiple, seemingly separate government agencies points towards a potential compromise of a shared service provider or a common software platform used across the Dutch government, representing a significant supply chain risk.
The impact of this breach is severe, with potential long-term consequences for national security and the safety of government employees.
Detecting a patient, sophisticated adversary requires deep and continuous monitoring.
M1047 - Audit): Centralized logging and continuous monitoring of authentication logs, VPN logs, and access logs from all agencies can help identify patterns of lateral movement or anomalous access that might be missed when looking at a single agency in isolation.M1032 - Multi-factor Authentication): Enforce phishing-resistant MFA for all remote access and access to sensitive systems to make credential theft more difficult.M1030 - Network Segmentation): Implement strong network segmentation between government agencies and between different security zones within an agency. This can contain a breach and prevent an attacker from easily moving from one target to another.Implement comprehensive and centralized logging across all agencies to enable effective threat hunting and incident investigation.
Enforce strong MFA for all user accounts, especially for remote access and access to sensitive systems, to mitigate the impact of credential theft.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats