NextFin news, Belgium has witnessed a marked increase in cyberattacks by pro-Russian hacker collectives throughout late 2025, most notably since early November. The hostile activity revolves around coordinated Distributed Denial-of-Service (DDoS) attacks targeting Belgian governmental digital infrastructure, including regional portals and municipal websites across Wallonia, Flanders, and the Brussels-Capital Region. These campaigns occur in reaction to Belgium’s vocal political support for Ukraine amid the ongoing Russia-Ukraine conflict, specifically after remarks by the Belgian Defense Minister regarding NATO responses to Russian aggression.
Among the key threat actors is the hacktivist group NoName057(16), which has independently claimed responsibility for multiple waves of attacks since November 2, 2025. Targets include Citydev Brussels, Walloon Parliament’s secure platforms, provincial portals such as Liège and Flemish Brabant, municipal election systems, and major telecom service providers like Proximus and Telenet. Concurrently, a coalition of eight other smaller pro-Russian and allied hacktivist groups has announced intentions to target Belgium’s digital ecosystem, emphasizing DDoS, operational technology (OT) environments, and potential data exposure operations, though actionable attacks from this group remain unconfirmed.
These attacks primarily employ SYN flood and HTTP GET flood techniques aimed at exhausting bandwidth and service response capacity, heavily focusing on network ports 80 (HTTP) and 443 (HTTPS). This operational focus targets public-facing websites and services central to government function and citizen engagement.
The origin of these campaigns closely aligns with geopolitical developments. Belgian political statements supporting Ukraine’s defense and NATO engagement have triggered backlash within pro-Russian cyber communities, who perceive these stances as provocations warranting retaliatory digital disruption. NoName057(16) publicly linked the attacks to such political events, underscoring a retaliatory motivation in their operational narrative.
From an analytical perspective, this surge in hacktivist activity against Belgium mirrors broader trends of hybrid warfare, where digital operations support strategic geopolitical objectives. Belgian reliance on interconnected digital government services and telecom infrastructure creates systemic vulnerabilities that hostile actors exploit to achieve asymmetric disruption without kinetic engagement.
Data indicates that the Belgian cyber landscape, while resilient, faces persistent stress from these volume-based DDoS campaigns. The dispersal of targets—spanning municipal to regional portals—demonstrates an attacker preference for easily available, publicly reachable assets to maximize impact and visibility. However, these attacks stop short of compromising national-level critical infrastructure or deploying destructive malware, suggesting current objectives are disruptive signaling and political coercion rather than infrastructural sabotage.
Belgium’s cybersecurity response capabilities are increasingly foregrounded in countering these threats. Continuous monitoring of threat actor communications via open-source intelligence (OSINT) and dark web surveillance tools—such as those provided by SOCRadar—allows anticipatory detection and mitigation planning. Attack Surface Management (ASM) tools help uncover exposed government and telecom assets vulnerable to exploitation, aiding in reducing the digital attack surface. Given the political motivation and persistent threat actor interest, Belgian authorities and private sectors must adopt an intelligence-driven, layered defense strategy encompassing DDoS mitigation, enhanced OT system protections, and rapid incident response mechanisms.
Looking ahead, this pattern of cyber aggression is likely to intensify given ongoing geopolitical tensions surrounding Ukraine and NATO’s evolving role under President Donald Trump’s administration. Russian cyber operations are strategically shifting from short-term tactical disruption toward embedding longer-term footholds within Western critical infrastructure ecosystems. Belgium, as a key NATO hub and political actor in the conflict, remains a high-value target.
The increasing sophistication of cyber-physical hybrid threats anticipated in Europe, as forecasted by Google Cloud Security’s 2026 Cybersecurity Report, suggests Belgium must brace for multi-vector attacks combining digital disruptions with disinformation campaigns aimed at undermining public trust. This environment also opens pathways for supply chain compromises targeting managed service providers, potentially magnifying risks beyond direct attacks.
In conclusion, Belgian digital infrastructure faces a growing cyber threat landscape characterized by politically motivated hacktivism with strategic hybrid warfare undertones. The necessity for robust cyber resilience — integrating proactive threat intelligence, resilient network architectures, and cross-sector cooperation — is more pressing than ever. Failure to adapt could lead to escalated cyber conflicts endangering service continuity, governance credibility, and Belgium’s role within NATO’s collective security framework.
According to SOCRadar Cyber Intelligence Inc., the current wave of attacks notably exploits the political context linking cyber aggression to Belgium’s NATO position on Ukraine. Google Cloud Security further predicts that 2026 will see a rise in cyber-physical attacks targeting European critical infrastructure, with Russia prioritizing long-term global strategic cyber objectives beyond immediate Ukraine conflict support.
Explore more exclusive insights at nextfin.ai.

