In late June 2025, the International Criminal Court (ICC) in The Hague faced a second major cyberattack in two years. The court confirmed the breach was “sophisticated and targeted,” but emphasized it was swiftly detected, contained, and fully investigated Reuters.
The incident occurred “late last week,” just after NATO leaders gathered nearby International Criminal Court
ICC systems spotted and contained the breach before major damage occurred AP News
This marks the second sophisticated cyberattack since 2023, when espionage was the suspected motive SecurityWeek
Details remain limited: no confirmed data exfiltration, no attribution, and ongoing forensic review Daily Security Review.
Risk Factor | Why It Matters |
---|---|
High-value target | The ICC handles sensitive war-crimes evidence—making it a prime target for espionage or disruption |
Repeated attacks | Two breaches in two years show that even strong security systems need resilience when facing persistent threats. |
Public trust at stake | Any disruption undermines global confidence in judicial institutions. Swift containment was essential. |
Detection & Response Matter More Than Prevention Alone
You may not prevent every intrusion—but you can catch and contain it fast.
System-wide Audits Are Critical
Just as the ICC performed a court-wide impact analysis, businesses need comprehensive reviews post-incident.
Transparency Builds Trust
The ICC’s timely public statement helped maintain credibility—communication matters.
Expect Advanced Persistent Threats (APTs)
This wasn't a random scan—it was targeted. Organizations must prepare for similar APT-level attacks.
✅ Penetration Testing & Red Teaming – Simulating advanced attacks to find real weaknesses
✅ Security Monitoring & Incident Response – Round-the-clock alerts and rapid containment
✅ Full-System Impact Assessments – Detect compromise and ensure no backdoors remain
✅ Crisis Communication Planning – Maintain stakeholder trust, even after a breach
If even the ICC—an institution that investigates global war crimes—can be breached, no organization is immune.