UK public sector, CNI in Russian hacktivist crosshairs
Hacktivists aligned to the Russian convey are ramping up their focusing on of UK organisations with denial of provider attacks
By
-
Alex Scroxton,
Safety Editor
Printed: 20 Jan 2026 20:47
A wave of denial of provider (DoS) attacks against UK organisations allegedly orchestrated by hacktivist Russian threat actors has introduced on the Nationwide Cyber Safety Centre (NCSC) to scenario an alert warning at-possibility bodies, seriously native authorities and vital nationwide infrastructure (CNI) operators, to shore up their defences.
Although somewhat unsophisticated, denial of provider attacks can repeat exceedingly disruptive – apart from knocking an well-known public-facing operations offline, to boot they plan off their victims to tie themselves in knots analysing, defending against, and recuperating from them, losing time, money and operational point of interest.
The NCSC talked about the fresh wave of attacks used to be driven by ideology and the UK’s enhance for Ukraine, in desire to monetary succeed in. On the opposite hand, the cyber company emphasised that, in the significant, the groups guilty are now now not working on the behest of Moscow itself, somewhat they are independently aligning to its needs.
“We proceed to peep Russian-aligned hacktivist groups focusing on UK organisations, and though denial-of-provider attacks also can be technically straightforward, their impact can also even be vital,” talked about NCSC director of nationwide resilience Jonathan Ellison.
“By overwhelming well-known web sites and online programs, these attacks can forestall americans from gaining access to the fundamental services they rely on daily.
“All organisations, seriously those identified in as we deliver’s alert, are told to act now by reviewing and imposing the NCSC’s freely on hand steering to provide protection to against DoS attacks and other cyber threats.”
Anti-DoS ways
The NCSC is encouraging any organisations that can be at possibility to take gargantuan precautions against disruptive hacktivist attacks.
This entails working with upstream web provider providers to assign what denial of provider mitigations they’ll also already like in space to provide protection to you and what they are allowed to assemble to limit your organisation to provide protection to their other possibilities in the event you come beneath attack.
It also can be price taking a peep into third-celebration dispensed denial of provider (DDoS) mitigation services and deliver material birth networks (CDNs) for any web-based services.
Organisations can also also put together in come to address attacks that upstream providers can now now not address by building their capabilities and services to scale all straight away, and guaranteeing there is adequate spare hardware skill to address the further masses.
It also can be well-known to put together and define a response notion in narrate that you just should well perhaps presumably even like a combating likelihood of preserving your services operational must the worst occur. In the NCSC’s playbook, these plans must encompass resplendent degradation of programs and services, the flexibility to address altering threat actor ways, guaranteeing you should well perhaps presumably also retain admin win entry to all the very most life like method thru an attack, and having a scalable fallback notion for an well-known services.
It’ll shuffle without pronouncing that these defences must be on a standard basis tested in narrate that security teams can bother attacks initiating and guard against them.
“Novel present chains and vital infrastructure are deeply interconnected, making disruption more uncomplicated than ever,” talked about Gary Barlet, Illumio public sector chief skills officer. “Hacktivists like efficiently targeted an well-known services all over Europe for years, and with rising geopolitical tensions in 2026, these attacks are doubtless to escalate.
“Downtime is the driving force now now not correct in the support of hacktivist project, nonetheless in the support of most cyber criminal campaigns. We would like a brand fresh ability of facing DoS attacks. For too lengthy, we like targeted fully on prevention, and this ability has now now not labored.
“The NCSC’s recommendation signals a switch by recommending that plans encompass maintaining administrative win entry to and imposing corpulent-scale backup plans. On the opposite hand, there needs to be a entire mindset shift interior well-known infrastructure organisations to point of interest on prioritising impact mitigation and affirming provider and operational uptime.”
Key actors
Closing month, the NCSC co-sealed a separate advisory on hacktivist project alongside accomplice companies from Australia, Czechia, France, Germany, Italy, Latvia, Lithuania, Contemporary Zealand, Romania, Spain, Sweden and the US.
This advisory highlighted the contaminated activities of loads of Russia-aligned hacktivist operations, most infamously NoName057(16), which operates a proprietary dispensed denial of provider (DDoS) tool called DDoSIA and used to be the matter of a prime Europol enforcement motion in July 2025.
The companies talked about NoName057(16) used to be doubtless phase of the Middle for the Gaze and Community Monitoring of the Formative years Environment – a Kremlin-backed “NGO” – and accused the organisation’s senior operatives and workers of funding the neighborhood and helping with malware trend and admin responsibilities.
In accordance to the old advisory, NoName057(16) has also been participating with other hacktivist operations, including participants of the Cyber Navy of Russia Reborn, an also-ran neighborhood that could well like fallen out with its backers.
In late 2024, the two groups collectively formed one other collective identified as Z-Pentest, which is claimed to specialise in focusing on operational skills interior CNI organisations and so-called hack-and-leak attacks and web bother defacements. Z-Pentest largely steers certain of DDoS activities.
One other neighborhood, formed about twelve months previously, is Sector16 – described by the NCSC and its partners as “newcomers”. Working alongside Z-Pentest, this operation is somewhat noisy online, and operates a public Telegram channel the build it boasts of its exploits and claims cyber attacks on US infrastructure. The companies talked about Sector165 also can be receiving indirect enhance from the Russian authorities in trade for running attacks that align with Moscow’s geopolitical needs.
Learn more on Hackers and cybercrime prevention
-

NCSC calls for motion after upward thrust in ‘nationally vital’ cyber incidents
By: Invoice Goodwin
-

European cyber police officers target NoName057(16) DDoS community
By: Alex Scroxton
-

Reflecting on three years of cyber battle in Ukraine
-

Emerging Ymir ransomware heralds more coordinated threats in 2025
By: Alex Scroxton







