By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: UK public sector, CNI in Russian hacktivist crosshairs | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > UK public sector, CNI in Russian hacktivist crosshairs | Computer Weekly
News

UK public sector, CNI in Russian hacktivist crosshairs | Computer Weekly

News Room
Last updated: 2026/01/21 at 1:07 AM
News Room Published 21 January 2026
Share
UK public sector, CNI in Russian hacktivist crosshairs | Computer Weekly
SHARE

A wave of denial of service (DoS) attacks against UK organisations allegedly orchestrated by hacktivist Russian threat actors has prompted the National Cyber Security Centre (NCSC) to issue an alert warning at-risk bodies, particularly local government and critical national infrastructure (CNI) operators, to shore up their defences.

Although relatively unsophisticated, denial of service attacks can prove exceedingly disruptive – besides knocking vital public-facing operations offline, they also cause their victims to tie themselves in knots analysing, defending against, and recovering from them, losing time, money, and operational focus.

The NCSC said the current wave of attacks was driven by ideology and the UK’s support for Ukraine, as opposed to financial gain. However, the cyber agency emphasised that in the main the groups responsible are not operating at the behest of Moscow itself, rather they are independently aligning to its goals.

“We continue to see Russian-aligned hacktivist groups targeting UK organisations and although denial-of-service attacks may be technically simple, their impact can be significant,” said NCSC director of national resilience, Jonathan Ellison.

“By overwhelming important websites and online systems, these attacks can prevent people from accessing the essential services they depend on every day. 

“All organisations, especially those identified in today’s alert, are urged to act now by reviewing and implementing the NCSC’s freely available guidance to protect against DoS attacks and other cyber threats.”

Anti-DoS tactics

The NCSC is encouraging any organisations that may be at risk to take ample precautions against disruptive hacktivist attacks.

This includes working with upstream internet service providers to establish what denial of service mitigations they may already have in place to protect you and what they are allowed to do to limit your organisation to protect their other customers should you come under attack.

It is also worth looking into third party distributed denial of service (DDoS) mitigation services and content delivery networks (CDNs) for any web-based services.

Organisations can also prepare in advance to deal with attacks that upstream providers cannot handle by building their applications and services to scale rapidly, and making sure there is adequate spare hardware capacity to deal with the additional loads.

It is also important to prepare and define a response plan so that you have a fighting chance of keeping your services operational should the worst happen. In the NCSC’s playbook, these plans should include graceful degradation of systems and services, the ability to deal with changing threat actor tactics, ensuring you can retain admin access during an attack, and having a scalable fallback plan for essential services.

It should go without saying that these defences should be regularly tested so that security teams can spot attacks starting and guard against them.

“Modern supply chains and critical infrastructure are deeply interconnected, making disruption easier than ever. Hacktivists have successfully targeted essential services across Europe for years, and with rising geopolitical tensions in 2026, these attacks are likely to escalate,” said Gary Barlet, Illumio public sector chief technology officer.

“Downtime is the driving force not just behind hacktivist activity, but behind most cyber-criminal campaigns. We need a new way of dealing with DoS attacks. For too long, we have focused solely on prevention, and this approach has not worked.

“The NCSC’s advice signals a change by recommending that plans include retaining administrative access and implementing full-scale backup plans. However, there needs to be an entire mindset shift within critical infrastructure organisations to focus on prioritising impact mitigation and maintaining service and operational uptime.”

Key actors

Last month the NCSC co-sealed a separate advisory on hacktivist activity alongside partner agencies from Australia, Czechia, France, Germany, Italy, Latvia, Lithuania, New Zealand, Romania, Spain, Sweden and the US.

This advisory highlighted the nefarious activities of several Russia-aligned hacktivist operations, most infamously NoName057(16), which operates a proprietary distributed denial of service (DDoS) tool called DDoSIA and was the subject of a major Europol enforcement action in July 2025.

The agencies said NoName057(16) was likely part of the Center for the Study and Network Monitoring of the Youth Environment (CISM) – a Kremlin-backed ‘NGO’ – and accused the organisation’s senior operatives and employees of funding the group and assisting with malware development and admin tasks.

According to the previous advisory, NoName057(16) has also been collaborating with other hacktivist operations, including members of the Cyber Army of Russia Reborn (CARR), an also-ran group that may have fallen out with its backers.

In late 2024, the two groups jointly formed another collective known as Z-Pentest, which is said to specialise in targeting operational technology (OT) within CNI organisations and so-called hack-and-leak attacks and website defacements. Z-Pentest largely steers clear of DDoS activities.

Another group, formed about 12 months ago, is Sector16 – described by the NCSC and its partners as “novices”. Working alongside Z-Pentest, this operation is relatively noisy online, and operates a public Telegram channel where it boasts of its exploits and claims cyber attacks on US infrastructure. The agencies said Sector165 may be receiving indirect support from the Russian government in exchange for running attacks that align with Moscow’s geopolitical goals.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article OpenAI says its AI wearable is on track as AI earbuds rumors spread OpenAI says its AI wearable is on track as AI earbuds rumors spread
Next Article The Best Smart LED Light Bulbs We’ve Tested for 2026 The Best Smart LED Light Bulbs We’ve Tested for 2026
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Palantir CEO says AI will eliminate the need for mass immigration –  News
Palantir CEO says AI will eliminate the need for mass immigration – News
News
The 10 Best Home Theater Systems For Cinephiles – BGR
The 10 Best Home Theater Systems For Cinephiles – BGR
News
Gates Foundation, OpenAI launch M AI health initiative targeting 1,000 clinics in Africa
Gates Foundation, OpenAI launch $50M AI health initiative targeting 1,000 clinics in Africa
Computing
OnePlus flatly denies shutdown rumors, calls report ‘false’
OnePlus flatly denies shutdown rumors, calls report ‘false’
News

You Might also Like

Palantir CEO says AI will eliminate the need for mass immigration –  News
News

Palantir CEO says AI will eliminate the need for mass immigration – News

4 Min Read
The 10 Best Home Theater Systems For Cinephiles – BGR
News

The 10 Best Home Theater Systems For Cinephiles – BGR

23 Min Read
OnePlus flatly denies shutdown rumors, calls report ‘false’
News

OnePlus flatly denies shutdown rumors, calls report ‘false’

2 Min Read
The First Planet Parade of 2026 Is in February: Here's How to See It
News

The First Planet Parade of 2026 Is in February: Here's How to See It

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?