Poland is looking into whether an attempted cyberattack on a nuclear research
facility was carried out by Iran, the government said on Thursday.
The country’s digital minister Krzysztof Gawkowski said in an emailed statement
that Poland had “identified an attempted cyberattack on the servers of the
National Centre for Nuclear Research,” which authorities had thwarted.
He told local media that the attack was carried out “in the past few days,”
Reuters reported.
The nuclear center said in a statement that “all safety systems operated
according to procedures.” A reactor is “operating safely and smoothly at full
power,” Jakub Kupecki, the center’s director said in the statement. The facility
carries out research into nuclear energy; Poland does not have nuclear weapons
of its own.
Polish cybersecurity services and the energy ministry are working with the
facility, Gawkowski said.
The minister told local media that there are early signals suggesting the attack
came from Iran, Reuters reported. “The first identifications of the entry
vectors … are related to Iran,” he said, adding that more investigation is
required.
Gawkowski added that hackers could also have used indicators linking the attack
to Iran in efforts to hide their real origins. Poland has faced a huge number of
Russian cyberattacks since the war in Ukraine began in 2022.
Western cyber and intelligence agencies have warned critical entities to be on
high alert for Iranian cyberattacks following the start of the conflict in late
February.
The Iranian embassy in Warsaw did not immediately respond to a request for
comment.
Tag - Network security
Chinese technology giant Huawei is participating in 16 projects funded by the
European Commission’s Horizon Europe research and innovation program despite
being dubbed a high-risk supplier.
The Commission restricted Huawei from accessing Horizon projects in 2023 after
saying that it (and another Chinese telecom supplier, ZTE) posed “materially
higher risks than other 5G suppliers” in relation to cybersecurity and foreign
influence.
However, public data reviewed by POLITICO’s EU Influence newsletter shows that
Huawei still takes part in several projects, many of which are in sensitive
fields like cloud computing, 5G and 6G telecom technology and data centers.
These projects mean Huawei has been working alongside universities and tech
companies in Spain, France, Sweden, Denmark, the Netherlands, Germany, Belgium,
Finland and Italy. It also has access to the intellectual property generated by
the projects, as the contracts require the sharing of information as well as
joint ownership of the results between partners.
A Commission spokesperson confirmed that of the 16 projects, 15 were signed
before the restrictions took place. The remaining project “was signed in 2025
and was assessed as falling outside the scope of the existing restrictions.”
Many of the projects started in January 2023, with the contracts running out at
the end of this year, while others will last until 2027, 2028 and 2030.
“Huawei participates in and implements projects funded under Horizon Europe in a
lawful and compliant manner,” a company spokesperson said.
One of the projects is to develop data privacy and protection tools in the
fields of AI and big data, along with Italy’s National Research Council, the
University of Malaga, the University of Toulouse, the University of Calabria,
and a Bavarian high-tech research institute for software-intensive systems.
Huawei received €207,000 to lead the work on “design, implementation, and
evaluation of use cases,” according to the contract for that project, seen by
POLITICO.
COMMISSION CRACKDOWN
Last month the Commission proposed a new Cybersecurity Act that would restrict
Huawei from critical telecoms networks under EU law, after years of asking
national capitals to do so voluntarily.
“I’m not satisfied [with] how the member states … have been implementing our 5G
Toolbox,” the Commission’s executive VP for tech and security policy, Henna
Virkkunen, told POLITICO at the time, referring to EU guidelines to deal with
high-risk vendors. “We know that we still have high-risk vendors in our 5G
networks, in the critical parts … so now we will have stricter rules on this.”
The Commission is also working on measures to cut Chinese companies out of
lucrative public contracts.
Bart Groothuis, a liberal MEP working on the Cybersecurity Act, told POLITICO
that the Commission should “honor the promises and commitments” it made “and
push them out.”
“They should be barred from participating. Period.”
Huawei was also involved in an influence scandal last year, with Belgian
authorities investigating whether the tech giant exerted undue influence over EU
lawmakers. The scandal led to Huawei’s being banned from lobbying on the
premises of the European Commission and the European Parliament.
BRUSSELS — European Parliament members on Monday slammed the Spanish government
for using Huawei to store judicial wiretaps, with one leading lawmaker warning
Madrid is putting its “crown jewels” at risk.
The Spanish government has drawn criticism since the summer after it awarded a
multimillion euro contract to Huawei for the storage of judicial wiretaps — a
move that led the United States to threaten to cease intelligence sharing with
Madrid.
The outcry over Spain’s use of the Chinese tech giant for sensitive services
lays bare how Europe continues to grapple with how to secure its digital systems
against security threats.
The European Union considers Huawei to be a high-risk supplier and wants to
crack down on countries that still afford it broad market access. The EU
proposed new draft cybersecurity legislation last month that, if approved, would
force EU member countries to kick Huawei out of their telecoms networks, after
years of trying to get capitals to ban the Chinese vendor voluntarily.
Lawmakers from several political groups said Spain’s contract with the Chinese
tech giant could endanger the EU as a whole.
“We cannot operate in a union where one of the states actively strips high-risk
vendors from its networks while another entrusts them with the crown jewels of
its law enforcement,” said Markéta Gregorová, a Czech Pirate Party lawmaker who
is part of the Greens group.
Gregorová leads negotiations on a cyber bill that would give the EU the power to
force Huawei and other — often Chinese — suppliers out of critical
infrastructure in Europe.
“When you introduce a high-risk vendor … we do not just risk a localized data
breach, we risk poisoning the well of European intelligence sharing,” she said
on Monday.
Juan Ignacio Zoido Álvarez, a member of Spain’s center-right opposition party,
said the decision puts “the entirety of the EU at risk.”
The Spanish government has defended the contract it struck for storing wiretaps.
Spain’s Interior Ministry said in a statement that the government had awarded a
contract to “European companies,” which then bought storage products. “There is
no risk to security, technological and legal sovereignty, nor is there any
foreign interference or threat to the custody of evidence,” the ministry said.
Interior Minister Fernando Grande-Marlaska told the Spanish parliament last
September that Telefónica, the country’s telecom champion, operated a state
surveillance system called SITEL and that storage “cabinets” had been integrated
into that system.
Bloomberg reported last July that Huawei equipment is not used for classified
information, with one government official saying the storage “represents a minor
part of a watertight, audited, isolated and certified system.”
On Monday, Juan Fernando López Aguilar, a prominent member of the European
Parliament for the Socialists and Democrats group and a member of Prime Minister
Pedro Sanchéz’s party in Spain, defended Madrid’s contract and pushed back on EU
moves to intervene on the issue.
In terms of “security, espionage, or violation of technological sovereignty,”
there is “no risk,” Aguilar said.
Huawei did not respond to a request for comment.
Convicted sex offender Jeffrey Epstein for years communicated with experts in
the cybersecurity community and expressed interest in attending two of the
largest hacker conventions in the world, according to documents released by the
Justice Department.
It’s unclear if Epstein ever attended either DEFCON or Black Hat, where
thousands of hackers and researchers gather annually in Las Vegas to discuss the
latest cyber vulnerabilities and trends. According to his emails with several
prominent researchers and business people, his interest in cybersecurity and
cryptography appeared to be widespread, ranging from discussions about removing
information about himself from online search engines to network security.
Jeff Moss, founder of both the Black Hat and DEFCON conferences, told POLITICO
in a statement that it’s unlikely Epstein actually made it to the conferences.
“As far as we can tell, he wanted to attend, but never did,” Moss said of
Epstein. “It looks like there were a lot of plans and I’m just waiting for some
sort of evidence that he followed through on them.”
According to the released emails, Epstein first made plans to attend DEFCON for
a few hours in August 2013 to meet with Pablos Holman, who at the time worked on
various tech and cyber projects at private equity company Intellectual Ventures.
It’s unclear whether Epstein and almost a dozen of his guests obtained tickets
to DEFCON or if Epstein attended.
It appears that Epstein and Holman had been in touch since 2010, according to
emails. Epstein in 2010 emailed cryptography researcher Ian Goldberg and said
Holman “suggested we speak.” Holman also planned to stay in Epstein’s
apartment while visiting New York City in 2013 and advised Epstein on how to
bury “negative stuff” online.
A spokesperson for the University of Waterloo, where Goldberg works within the
School of Computer Science, confirmed to POLITICO that Goldberg turned down the
offer from Epstein in 2010 to fund his work at the university. Holman, who
currently serves as a general partner at venture capital group Deep Future, did
not respond to multiple requests for comment.
Joi Ito, the current president of Japan’s Chiba Institute of Technology and
former director of the Massachusetts Institute of Technology’s Media Lab,
appears to have introduced entrepreneur and researcher Vincenzo Iozzo via email
to Epstein in 2014, according to the emails. Ito stepped down from his role at
MIT in 2019 when previous disclosures revealed Ito had accepted about $1.7
million from Epstein for the lab and his own investment funds. Spokespersons for
Chiba Institute of Technology did not respond to a request for comment on Ito’s
connections to Epstein. Ito previously apologized for his association with
Epstein and stressed that he was “never involved in, never heard him talk about
and never saw any evidence of the horrific acts that he was accused of.”
According to the emails, Iozzo, who currently serves as CEO of identity
management company SlashID, discussed obtaining tickets for Epstein to attend
DEFCON conferences in Las Vegas in 2016 and 2018. Iozzo previously served in
roles at cybersecurity company CrowdStrike and as a board member for the annual
Black Hat conference. He also planned to meet with Epstein at his New York City
home on at least five occasions in 2014, 2015, 2016, 2017 and 2018.
One email sent by Epstein to Iozzo ahead of the 2016 conferences noted he wanted
to bring guests, including former Israeli Prime Minister Ehud Barak, American
billionaire Tom Pritzker and “four girls.” It’s not clear if Epstein attended
the conference that year or met with Barak, Pritzker or Iozzo.
A spokesperson for Barak told POLITICO that the former prime minister “did not
attend DEFCON in 2016,” and further noted that Epstein never asked him to
attend. The spokesperson stressed that Barak “has repeatedly and publicly stated
that he deeply regrets having any association with Jeffrey Epstein.”
Separate spokespersons for Hyatt Hotels — where Pritzker serves as executive
chairman of the board of directors — and for the Pritzker Organization did not
respond to a request for comment.
Epstein again discussed attending DEFCON in 2018, which Iozzo also offered to
procure tickets for, according to the emails. Ahead of the 2018 convention,
Epstein requested to meet with “founder” of Black Hat, but Iozzo wrote in an
email that this person had turned down the meeting due to “what’s out there
online” about Epstein. The founder, however, was “happy” to provide Epstein with
tickets to the event, Iozzo wrote. It’s unclear if Epstein was referring to Moss
or someone else.
Moss told POLITICO in a statement that he “turned down Vincenzo’s badge request”
for Epstein, and “advised Vincenzo to stay clear” of the disgraced financier.
Moss noted that it’s possible Iozzo bought passes to the conference separately.
An FBI file released by the Justice Department — first reported by TechCrunch —
suggested that Epstein had a “personal hacker” who developed “offensive cyber
tools” that were sold to several unnamed governments. It’s unclear if the
information provided by the unnamed informant to the FBI is accurate.
The name of the hacker is redacted in the file but a description of the person —
including that they had a company that was acquired by CrowdStrike in
2017 and found vulnerabilities in Blackberry and iOS devices — matches Iozzo.
Iozzo strongly denied that he was the so-called personal hacker for Epstein and
issued a lengthy statement to POLITICO refuting the claims made by the FBI
informant, including his alleged past work for foreign governments.
Iozzo said that his interactions with Epstein “were limited to business
opportunities that never materialized, as well as discussion of the markets and
emerging technologies.”
“The latest release of files contains a document with fabricated claims made
about me to an FBI agent over eight years ago,” Iozzo said, noting that neither
the FBI nor any other government agency ever contacted him about the file.
“These accusations are false and defamatory. For the avoidance of doubt, it
should go without saying that I have never been involved in any illegal or
unethical activity.”
Iozzo also said that he did not provide Epstein with “exclusive access” to the
DEFCON and Black Hat conferences and did not know if Epstein actually attended
either event.
“I unfortunately knew Epstein for professional reasons,” Iozzo said. “I wish I
did not. We were introduced by people whom I trusted and admired when I was 25
fundraising for my startup in 2014. Because of this, I failed to ask the right
questions — questions that, in retrospect, seem obvious. I foolishly accepted
the narrative that was presented to me by others that greatly minimized the
magnitude of his horrific actions.”
“I regret the past association and take full responsibility for not exercising
greater judgment at the time,” he added.
Epstein’s interest in the Black Hat and DEFCON conventions began years after he
had been convicted of and jailed for soliciting sex from minors in 2008.
Following his incarceration, Epstein reportedly took steps to scrub
references to his conviction from the internet with the help of cyber
professionals.
Epstein was again arrested and charged with sex trafficking minors in 2019,
though the federal case was formally dismissed in August 2019 following his
death by suicide in jail while awaiting trial.
MUNICH, Germany — U.S. officials have countered Europe’s push for technology
sovereignty from America with a clear message: It’s China you should worry
about, not us.
The European Union is rolling out a strategy to reduce its reliance on foreign
technology suppliers. Donald Trump’s return to office has put the focus on
American cloud giants, companies like Elon Musk’s Starlink and X and others —
with European officials increasingly concerned that Washington has too much
control over Europe’s digital infrastructure.
As political leaders and security and intelligence officials met in Germany for
the Munich Security Conference, Washington sought to calm nerves. The idea that
Trump can pull the plug on the internet is not “a credible argument,” the United
States’ National Cyber Director Sean Cairncross told an audience Thursday.
Europe and the U.S. “face the same sort of threat and the same threat actors,”
said Cairncross, who advises Trump on cybersecurity policy. Rather than weaning
off America, wean off China, he said: “There is a clean tech stack. It is
primarily American. And then there is a Chinese tech stack.”
Claiming that U.S. tech is as risky as Chinese tech is “a giant false
equivalency,” according to Cairncross. “Personal data doesn’t get piped to the
state in the United States,” he said, referencing concerns that the Beijing
government has laws requiring firms to hand over data for Chinese surveillance
and espionage purposes.
The attempt to quell concerns is notable even if it may not change the direction
of travel in Europe. The European Commission wants to boost homegrown technology
with a “tech sovereignty” package this spring. It presented a cybersecurity
proposal in January that, if approved, could be used to root out suppliers that
pose security risks — including from America.
“We want to ensure that we don’t have risky dependencies when it comes to
critical sectors,” the Commission’s Executive Vice President Henna Virkkunen
told POLITICO in an interview in Munich on Friday. “We see this in AI, quantum
technologies and semiconductors — we must have a certain level of capacity
ourselves.”
Europe’s attempt to pivot away from U.S. dependencies, while not new, has gained
support in past months as the transatlantic alliance creaked. The POLITICO
Poll conducted in February showed far more people described the U.S. as an
unreliable ally than a reliable one across four countries, including half the
adults polled in Germany and 57 percent in Canada.
“The leadership claim of the U.S. is being challenged, perhaps already lost,”
German Chancellor Friedrich Merz told the conference Friday.
REBALANCING ACT
Europe is still working out what a forceful attempt to build technology
sovereignty would look like, as it reforms everything from industrial policy
programs to procurement rules and data and cybersecurity requirements on
companies and governments.
Top European cyber officials in Munich told POLITICO that technological
sovereignty does not mean cutting ties with trusted partners.
Vincent Strubel, director of France’s cybersecurity agency ANSSI, said
sovereignty means avoiding being bound by rules set elsewhere. “It’s about
identifying what leverage non-European countries may have based on the
technology they provide,” Strubel said in an interview. “It’s not about being
friendly or unfriendly with any country — it’s about recognizing that we
[currently] have no say in how that leverage might be used.”
Claudia Plattner, head of Germany’s cybersecurity agency BSI, said, “We need to
become more independent. We need to strengthen our local and European industries
… We need to become digitally successful — that is essential to economic
strength and to security.”
The BSI plans to test sovereign cloud offerings from several large tech
companies, including AWS and Google. The testing will examine whether European
services can operate independently from parent systems and will help inform
Germany’s national cloud strategy.
Critics of Europe’s efforts to turn away from the U.S. say it is bound to lead
to worse security.
Christopher Ahlberg, the CEO of threat intelligence firm Recorded Future, said
he understood that things like military command and control must remain
national, “but if you start choosing sub-par cyber products just to achieve
sovereignty, you’re going to be target No. 1 because threat actors will discover
the vulnerabilities.”
COMMON GROUND ON CHINA
While tensions persist over the U.S.’s dominant position, Washington and
European capitals have common ground when it comes to caution over Chinese tech.
The EU is drafting legal requirements to cut out Chinese tech from critical
supply chains including telecom networks, energy grids, security systems and
railways. That move drew the ire of the Chinese government, which called it
“blatant protectionism.”
Many of the measures mirror what U.S. authorities have done in the past decade.
“The U.S. understands what national security is. They don’t want to hear: ‘The
U.S. is a threat.’ But they understand resilience,” said Sébastien Garnault, a
prominent French cyber policy consultant.
Trump “is putting America first, and the same goes in cyberspace,” Cairncross
said. But, he added, “we don’t want it to be America alone. We want that
partnership.”
Laurens Cerulus contributed reporting.
China’s foreign ministry on Wednesday said a new European Commission proposal to
restrict high-risk tech vendors from critical supply chains amounted to “blatant
protectionism,” warning European officials that Beijing will take “necessary
measures” to protect Chinese firms.
Beijing has “serious concerns” over the bill, Chinese foreign ministry
spokesperson Guo Jiakun told reporters, according to state news agencies’
reports.
“Using non-technical standards to forcibly restrict or even prohibit companies
from participating in the market, without any factual evidence, seriously
violates market principles and fair competition rules,” Guo said.
The European Commission on Tuesday unveiled its proposal to revamp the bloc’s
Cybersecurity Act. The bill seeks to crack down on risky technology vendors in
critical supply chains ranging across energy, transport, health care and other
sectors.
Though the legislation itself does not name any specific countries or companies,
it is widely seen as being targeted at China. 5G suppliers Huawei and ZTE are in
the EU’s immediate crosshairs, while other Chinese vendors are expected to be
hit at a later stage.
European Commission spokesperson Thomas Regnier responded to the Chinese foreign
ministry, saying Europe has allowed high-risk vendors from outside the EU in
strategic sectors for “far too long.”
“We are indeed radically changing this. Because we cannot be naive anymore,”
Regnier said in a statement. The exclusion of high-risk suppliers will always be
based on “strong risk assessments” and in coordination with EU member countries,
he said.
China “urges the EU to avoid going further down the wrong path of
protectionism,” the Chinese foreign ministry’s Guo told reporters. He added the
EU bill would “not only fail to achieve so-called security but will also incur
huge costs,” saying some restrictions on using Huawei had already “caused
enormous economic losses” in Europe in past years.
European telecom operators warned Tuesday that the law would impose
multi-billion euro costs on the industry if restrictions on using Huawei and ZTE
were to become mandatory across Europe.
A Huawei spokesperson said in a statement that laws to block suppliers based on
their country of origin violate the EU’s “basic legal principles of fairness,
non-discrimination, and proportionality,” as well as its World Trade
Organization obligations. The company “reserve[s] all rights to safeguard our
legitimate interests,” the spokesperson said.
ZTE did not respond to requests for comment on the EU’s plans.
BRUSSELS — The European Parliament is considering whether to ban access to
Russian websites such as Sputnik and RT from its IT infrastructure.
Scores of websites hosting the broadcasters’ content remain accessible despite
the EU sanctioning Russian media across the bloc in 2022 after Moscow launched
its full-scale invasion of Ukraine.
The right-wing European Conservatives and Reformists, whose Polish and Italian
leaders publicly oppose Russia’s war, asked during a political group leaders’
meeting on Oct. 15 for “Russian propaganda websites under EU sanctions” to be
made inaccessible on Parliament’s IT infrastructure.
The request comes from Latvian MEP Rihards Kols, who said he wants the
Parliament to block access to RT, Sputnik, VGTRK, ANO TV Novosti and others
across all Parliament devices and networks.
“This is a matter of information security, institutional coherence, and the
credibility of the Parliament’s position against Russian disinformation,” he
told POLITICO, adding that “the Latvian national media regulator has raised the
issue directly with [Parliament] President [Roberta] Metsola.”
If approved, the measure would mirror restrictions already imposed on the social
media giant TikTok, whose parent company ByteDance is headquartered in Beijing,
over network security concerns. The TikTok app was blocked on the Parliament’s
Wi-Fi and devices in March 2023.
Several political group leaders expressed concerns that the ban could set a
precedent for websites being banned “for reasons other than security,” and cited
the technical and legal challenges of enforcing such restrictions, according to
the meeting notes.
Metsola is “investigating” the possibility and studying which other measures are
applied in other EU institutions, according to the notes.
Kols said “a solution is expected to be proposed in the near future.”
The Parliament’s press service said in a statement the matter will be discussed
again in a future leaders’ meeting. “The European Parliament takes the
protection of its users and their data seriously and implement measures to
protect these and its infrastructures.”
BRUSSELS — First it was telecom snooping. Now Europe is growing worried that
Huawei could turn the lights off.
The Chinese tech giant is at the heart of a brewing storm over the security of
Europe’s energy grids. Lawmakers are writing to the European Commission to urge
it to “restrict high-risk vendors” from solar energy systems, in a letter seen
by POLITICO. Such restrictions would target Huawei first and foremost, as the
dominant Chinese supplier of critical parts of these systems.
The fears center around solar panel inverters, a piece of technology that turns
solar panels’ electricity into current that flows into the grid. China is a
dominant supplier of these inverters, and Huawei is its biggest player. Because
the inverters are hooked up to the internet, security experts warn the inverters
could be tampered with or shut down through remote access, potentially causing
dangerous surges or drops in electricity in Europe’s networks.
The warnings come as European governments have woken up to the risks of being
reliant on other regions for critical services — from Russian gas to Chinese
critical raw materials and American digital services. The bloc is in a stand-off
with Beijing over trade in raw materials, and has faced months of pressure from
Washington on how Brussels regulates U.S. tech giants.
Cybersecurity authorities are close to finalizing work on a new “toolbox” to
de-risk tech supply chains, with solar panels among its key target sectors,
alongside connected cars and smart cameras.
Two members of the European Parliament, Dutch liberal Bart Groothuis and Slovak
center-right lawmaker Miriam Lexmann, drafted a letter warning the European
Commission of the risks. “We urge you to propose immediate and binding measures
to restrict high-risk vendors from our critical infrastructure,” the two wrote.
The members had gathered the support of a dozen colleagues by Wednesday and are
canvassing for more to join the initiative before sending the letter mid next
week.
According to research by trade body SolarPower Europe, Chinese firms control
approximately 65 percent of the total installed power in the solar sector. The
largest company in the European market is Huawei, a tech giant that is
considered a high-risk vendor of telecom equipment. The second-largest firm is
Sungrow, which is also Chinese, and controls about half the amount of solar
power as Huawei.
Huawei’s market power recently allowed it to make its way back into SolarPower
Europe, the solar sector’s most prominent lobby association in Brussels, despite
an ongoing Belgian bribery investigation focused on the firm’s lobbying
activities in Brussels that saw it banned from meeting with European Commission
and Parliament officials.
Security hawks are now upping the ante. Cybersecurity experts and European
manufacturers say the Chinese conglomerate and its peers could hack into
Europe’s power grid.
“They can disable safety parameters. They can set it on fire,” Erika Langerová,
a cybersecurity researcher at the Czech Technical University in Prague, said in
a media briefing hosted by the U.S. Mission to the EU in September.
Even switching solar installation off and on again could disrupt energy supply,
Langerová said. “When you do it on one installation, it’s not a problem, but
then you do it on thousands of installations it becomes a problem because the …
compound effect of these sudden changes in the operation of the device can
destabilize the power grid.”
Surges in electricity supply can trigger wider blackouts, as seen in Spain and
Portugal in April. | Matias Chiofalo/Europa Press via Getty Images
Surges in electricity supply can trigger wider blackouts, as seen in Spain and
Portugal in April.
Some governments have already taken further measures. Last November, Lithuania
imposed a ban on remote access by Chinese firms to renewable energy
installations above 100 kilowatts, effectively stopping the use of Chinese
inverters. In September, the Czech Republic issued a warning on the threat posed
by Chinese remote access via components including solar inverters. And in
Germany, security officials already in 2023 told lawmakers that an “energy
management component” from Huawei had them on alert, leading to a government
probe of the firm’s equipment.
CHINESE CONTROL, EU RESPONSE
The arguments leveled against Chinese manufacturers of solar inverters echo
those heard from security experts in previous years, in debates on whether or
not to block companies like video-sharing app TikTok, airport scanner maker
Nuctech and — yes — Huawei’s 5G network equipment.
Distrust of Chinese technology has skyrocketed. Under President Xi Jinping, the
Beijing government has rolled out regulations forcing Chinese companies to
cooperate with security services’ requests to share data and flag
vulnerabilities in their software. It has led to Western concerns that it opens
the door to surveillance and snooping.
One of the most direct threats involves remote management from China of products
embedded in European critical infrastructure. Manufacturers have remote access
to install updates and maintenance.
Europe has also grown heavily reliant on Chinese tech suppliers, particularly
when it comes to renewable energy, which is powering an increasing proportion of
European energy. Domestic manufacturers of solar panels have enough supply to
fill the gap that any EU action to restrict Chinese inverters would create,
Langerová said. But Europe does not yet have enough battery or wind
manufacturers — two clean energy sector China also dominates.
China’s dominance also undercuts Europe’s own tech sector and comes with risks
of economic coercion. Until only a few years ago, European firms were
competitive, before being undercut by heavily subsidized Chinese products, said
Tobias Gehrke, a senior policy fellow at the European Council on Foreign
Relations. China on the other hand does not allow foreign firms in its market
because of cybersecurity concerns, he said.
The European Union previously developed a 5G security toolbox to reduce its
dependence on Huawei over these fears.
It is also working on a similar initiative, known as the ICT supply chain
toolbox, to help national governments scan their wider digital infrastructure
for weak points, with a view to blocking or reduce the use of “high-risk
suppliers.”
According to Groothuis and Lexmann, “binding legislation to restrict risky
vendors in our critical infrastructure is urgently required” across the European
Union. Until legislation is passed, the EU should put temporary measures in
place, they said in their letter.
Huawei did not respond to requests for comment before publication.
This article has been updated.
A major outage of Amazon Web Services servers affecting multiple websites Monday
morning prompted immediate calls for Europe to boost its tech sovereignty.
Slack, Snapchat, Signal and Perplexity were among the affected sites. Amazon Web
Services (AWS) offers cloud servers that allow these services and millions of
other websites and platforms to run.
Brussels is in the midst of a debate on how to achieve digital sovereignty, and
what that means exactly, with cloud services at the center of the conversation.
EU leaders are expected to take a position during a high-level summit meeting
later this week.
“Today’s outage shows how concentrated power makes the internet fragile and this
lack of resilience hits our economies as a result,” technologist Robin Berjon
said in an email. Berjon co-founded the Eurostack project — an initiative
campaigning to make Europe self-reliant in digital services.
“Europe’s dependency on monopoly cloud companies like Amazon is a security
vulnerability and an economic threat we can’t ignore,” Cori Crider, executive
director of the Future of Technology Institute, said in an email.
According to AWS’s health dashboard, which shows a “running log of AWS service
interruptions for the past 12 months,” the outage originated with servers in
North America and specifically Virginia.
That prompted reaction including from Ulrike Franke, senior fellow at the
European Council on Foreign Relations: “My robot vacuum cleaner no longer works
and can someone explain why a robot in Paris is linked to U.S. East? Talk about
European digital sovereignty…” she posted on Bluesky.
“These disruptions are not just technical issues, they’re democratic failures,”
said Corinne Cath-Speth, head of digital at civil society group Article 19.
“When a single provider goes dark, critical services go offline with it — media
outlets become inaccessible, secure communication apps like Signal stop
functioning, and the infrastructure that serves our digital society crumbles.”
“We urgently need diversification in cloud computing,” she added.
Transcription service Trint said in an email that it had experienced disruption
but “customers on our EU servers should be largely unaffected.”
In a statement shared with media outlets, Amazon Web Services said: “We continue
to observe recovery across most of the affected AWS Services. We can confirm
global services and features that rely on US-EAST-1 have also recovered. We
continue to work towards full resolution and will provide updates as we have
more information to share.”
Asked at a briefing of reporters in Brussels on Monday, European Commission
spokesperson Markus Lammert said the outage “would be a question for the
companies, this is not for us to comment on.”
With regard to how it had affected the Commission’s own operations, Paula Pinho,
chief spokesperson for the European Commission, said: “We were more using for
instance e-mails. We go back to our traditional methods.”
Pieter Haeck contributed reporting.
BRUSSELS — Crafty hacking groups backed by hostile states have increasingly
targeted European public institutions with cyber espionage campaigns in the past
year, the European Union’s cybersecurity agency said Wednesday.
Public institutions were the most targeted type of organization, accounting for
38 percent of the nearly 5,000 incidents analyzed, the ENISA agency said in its
yearly threat landscape report on European cyber threats.
The EU itself is a regular target, it added. State-aligned hacking groups
“steadily intensified their operations toward EU organizations,” ENISA said,
adding that those groups carried out cyber espionage campaigns on public bodies
while also attempting to sway the public through disinformation and
interference.
The report looked at incidents from July 1, 2024 to June 30, 2025.
Multiple European countries said in August that they had been affected by “Salt
Typhoon,” a sprawling hacking and espionage campaign believed to be run by
China’s Ministry of State Security.
In May, the Netherlands also attributed a cyber espionage campaign to Russia,
and the Czech government condemned China for carrying out a cyberattack against
its foreign ministry exposing thousands of unclassified emails.
These incidents underlined how European governments and organizations are
increasingly plagued by cyber intrusions and disruption.
Though state-backed cyber espionage is on the rise, ENISA said the most
“impactful” threat in the EU is ransomware, a type of hack where criminals
infiltrate a system, shut it down and demand payment to allow victims to regain
control over their IT.
Another type of attack, known as distributed denial-of-service (DDoS), was the
most common type of incident, ENISA said. DDoS attacks are most commonly
deployed by cyber activists.
ENISA said different types of hacking groups are increasingly using each others’
tactics, most notably when state-aligned groups use cyber-activist techniques to
hide their provenance.
The agency also highlighted the threat to supply chains posed by cyberattacks,
saying the interconnected nature of modern services can amplify the effect of a
cyberattack.
Passengers at Brussels, Berlin and London Heathrow airports recently experienced
severe delays due to a cyberattack on supplier Collins Aerospace, which provides
check-in and boarding systems.
“Everyone needs to take his or her responsibilities seriously,” Hans de Vries,
the agency’s chief operations officer, told POLITICO. “Any company could have a
ripple effect … We are so dependent on IT. That’s not a nice story but it’s the
truth.”