Published by Liam James
May 20, 2022
It’s been more than three months since Russia invaded Ukraine, and instead of the wall-to-wall news coverage we saw in the first few days, it has all started to feel more like background noise. The atrocities continue, but as the focus in the media returns to football matches or the cost-of-living crisis, conflict in the Ukraine no longer dominates the headlines. Rightly or wrongly, the shock factor has worn off. But as we adjust to a ‘new normal’ of Russian aggression hovering in our peripheral vision, we can’t afford to become complacent. Many of us have breathed a metaphorical – or literal – sigh of relief, as Russia has been revealed to be far less of a military threat than we once thought, unable as yet to secure ‘significant results’ from their ongoing offensive. It is precisely this military frustration, however, that will encourage Russian officials to consider alternative methods of applying pressure on the West, and Five Eyes warns ‘evolving intelligence indicates that the Russian government is exploring options for potential cyber-attacks’.
The use of cyber-attacks as strategy is far from unprecedented – Jen Easterly, Director of the US cybersecurity agency CISA, notes that ‘malicious cyber activity is part of the Russian playbook’. In 2017, the disruptive NotPetya attack targeting Ukraine spread across Europe, costing organisations hundreds of millions. Distributed denial-of-service (DDoS) attacks also successfully disrupted the Ukrainian banking sector immediately before the invasion in February 2022. Our 21st century reliance on digital infrastructures make them highly desirable targets for disruption – targets that also happen to lack the protection of land or borders. An additional concern is that Russian state-sponsored activity isn’t the only source of threat. Equally worrying are the numerous cyber-criminal groups that have aligned themselves with Russian interests, and could target any country providing support for Ukraine, or seen to be applying pressure on the Russian government or people. Killnet, a pro-Russian hacker group, has already claimed credit for a recent DDoS attack on a US airport. With the UK and EU both increasing economic sanctions this month, intelligence suggests that the NHS, nuclear power stations, and parts of the civil service could be at risk  – although any organisation could be affected.
The NCSC and international cybersecurity authorities are urging critical infrastructure to prepare for a range of potential cyber threats, including malware, ransomware, DDoS attacks, and cyber espionage.
Immediate actions for all organisations include:
prioritising the patching of known exploited vulnerabilities
enforcing multi-factor authentication (MFA)
monitoring remote desktop protocol (RDP)
providing end-user awareness and training
As NCSC CEO Cameron succinctly states: ‘In this period of heightened cyber threat, it has never been more important to plan and invest in longer-lasting security measures.’ 
The threat is real – but it can be managed. If you have questions about what you need to implement now, or would like advice on how to strengthen cybersecurity across your organisation, then talk to us at email@example.com.