UK

UK cyber chiefs warn organisations to be aware of new Russian web attack tactics

Government bodies, tech companies and financial institutions are among those Russia’s foreign intelligence service are pursuing, advice warns.

The advisory warns SVR attackers are exploiting cyber vulnerabilities on a massive scale
The advisory warns SVR attackers are exploiting cyber vulnerabilities on a massive scale (Dominic Lipinski/PA)

UK cyber security chiefs have issued a new warning to Government bodies, tech companies and financial institutions to ensure they are safe from Russian state-backed hackers.

The latest advice from the National Cyber Security Centre (NCSC), penned alongside US security agencies, shares the most recent tactics used by the SVR – Russia’s foreign intelligence service – to collect information that could help it in future cyber operations.

This could include efforts to help Russia in its ongoing invasion of Ukraine, according to the agencies.

The advisory warns SVR attackers are exploiting cyber vulnerabilities on a massive scale, and have two types of intended victims for their actions.

The first of these are “targets of intent”, and include Government and diplomatic bodies, think tanks, tech companies, and financial institutions.

Join the Irish News Whatsapp channel

The second are “targets of opportunity”, where the SVR scans internet systems to look for vulnerabilities that could be exploited.

Once either kind of victim has been compromised, follow-up attacks by the SVR are likely, the advisory said.

UK organisations who believe they have been subject to the kind of Russian cyber attack highlighted in the advice are being urged to report it to the NCSC.

NCSC director of operations Paul Chichester said: “Russian cyber actors are interested in and highly capable of accessing unpatched systems across a range of sectors, and once they are in, they can exploit this access to meet their objectives.

“All organisations are encouraged to bolster their cyber defences: take heed of the advice set out within the advisory and prioritise the deployment of patches and software updates.”