Supply Chain Risk in 2026: The Hidden Threats Beyond Your Estate

Supply Chain Risk in 2026: The Hidden Threat Beyond Your Estate

Organisations are connected to more than ever before meaning supply chains have expanded and so too has the level of risk associated with these diverse supply chains.

Cloud services, managed service providers, SaaS platforms, open source software and outsourced business functions now form part of an extended digital supply chain that sits well beyond the traditional network perimeter. According to recent industry analysis by DeepStrike, third party involvement is now present in approximately 30% of all data breaches, double the proportion seen just a few years ago.

More concerning still, research from IBM shows that breaches involving supply chain compromise are typically more expensive and take longer to contain than other incidents. While the global average cost of a data breach currently sits at roughly $4.44 million, breaches via supply chains are uniquely more damaging. A supply chain compromise is one of the most significant factors that amplifies the total cost of a breach. In the UK it can cost an organisation an additional average of £241,620. (source: DeepStrike)

According To IBM’s Cost of a Data Breach Report 2025 it takes an average of 267 days to identify and contain a breach. As attackers increasingly exploit trusted relationships, instead of relying solely on technical vulnerabilities, supply-chain risk is now one of the most critical cyber security challenges for organisations of any size.


Understanding Your Supply Chain Risk

Supply chain cyber risk refers to the exposure an organisation faces as a result of its reliance on third‑party suppliers, vendors, partners, and software components. Rather than attacking a target directly, threat actors compromise a supplier and leverage the trust relationship to gain access to downstream victims.

Supply chain attacks have become an increasingly common and damaging tactic among cyber criminals. These breaches highlight just how vulnerable organisations can be when the security of their partners, vendors, and software providers is compromised.

Understanding supply chain risk begins with achieving full visibility across all third-party services and suppliers your organisation relies upon. Identifying these critical relationships is essential, as gaps in awareness can expose internal systems and sensitive data to external threats.

Assessing each supplier’s security maturity and posture helps clarify potential vulnerabilities, while evaluating how easily attackers might exploit these connections provides insight into your overall risk profile.

Importantly, your industry or sector also shapes the likelihood and nature of supply chain attacks. Certain fields, such as finance or healthcare, face heightened targeting due to the value of their assets and data. Proactive supply chain risk assessment empowers organisations to anticipate, mitigate, and respond to threats more effectively.


Supply Chain Sorted, with HackRisk

HackRisk’s Supply Chain Security tools proactively manage your third-party risk, monitor vendor posture, and strengthen your supply chain security.

Our Supply Chain Security tool gives you real-time insight into third-party risk across your ecosystem. Invite your suppliers to join HackRisk, share your HackRisk Scores and encourage your suppliers to invite their own vendors to build a stronger, more resilient supply chain.

Get Your Free Report

Why Supply Chain Risk Management Matters

Supply chain attacks are no longer rare, isolated incidents. Industry reporting throughout 2024 and 2025 shows sustained growth in both the frequency and impact of supply‑chain driven breaches, particularly those involving software vendors, open‑source ecosystems and managed service providers. This surge has prompted organisations to turn to established frameworks and risk models for guidance in managing supply chain cyber risk.

NIST Framework

One of the most widely recognised frameworks is the NIST Cybersecurity Framework (CSF), which provides a structured approach to identifying, protecting, detecting, responding to, and recovering from cyber threats, including those originating from the supply chain.

NIST has published dedicated guidance, such as NIST SP 800-161 Revision 1: “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations”, which outlines best practices for assessing, monitoring, and mitigating risks associated with third-party vendors, software components, and service providers. The framework emphasizes the importance of integrating supply chain risk management (SCRM) into overall cybersecurity strategy, including activities like supplier risk assessments, contract security requirements, continuous monitoring, and incident response planning.

Other Frameworks

Other notable frameworks include the ISO/IEC 27001 and ISO/IEC 27036 series, which address information security management and specific guidelines for managing risks in supplier relationships. The Center for Internet Security (CIS) Controls also recommends measures such as maintaining an inventory of third-party assets, enforcing least-privilege access, and regularly validating supplier security practices.

By leveraging these frameworks, organisations can systematically identify vulnerabilities in their supply chain, implement robust controls, and foster a culture of continuous improvement and vigilance. Proactive supply chain risk management is now considered essential for defending against the evolving threat landscape, as highlighted by recent high-profile breaches and ongoing industry research.


Real‑World Supply Chain Breach Examples

XZ Utils Open‑Source Backdoor (2024): A sophisticated backdoor was discovered in a widely used Linux compression library, demonstrating how long‑term social engineering and open‑source dependency risks can threaten critical infrastructure globally. (source: Datadog Security Labs)

SolarWinds Orion Breach (2020): Perhaps the most infamous supply chain attack in recent memory, the SolarWinds incident saw hackers infiltrate the company’s software development pipeline. By compromising updates for the widely used Orion IT monitoring platform, attackers were able to insert malicious code that was subsequently pushed to approximately 18,000 customers, including major government agencies and global corporations. This breach demonstrated how a single compromised supplier can result in a cascade of downstream victims, often undetected for months. (source: NCSC)

Kaseya Ransomware Attack (2021): In another headline-grabbing example, cybercriminals targeted Kaseya, a company that provides IT management software to managed service providers (MSPs). By exploiting a vulnerability in Kaseya’s VSA platform, hackers were able to distribute ransomware to hundreds of organisations in one coordinated attack. The event underscored how attackers can use trusted software suppliers as a force multiplier to scale their impact and bypass traditional security measures. (source: PurpleSec)

Jaguar Land Rover Supply Chain Attack (2024): In a high-profile incident, attackers targeted Jaguar Land Rover by exploiting a well-known vulnerability in a third-party SAP (NetWeaver) platform used by one of the automaker’s suppliers. This breach disrupted production and supply chain operations, demonstrating how cybercriminals can leverage weaknesses in widely deployed enterprise software to compromise even mature organisations. The overall cost from the incident is estimated to be at least £1.9 billion ($2.5 billion), making it the most economically damaging cyber event ever recorded in the UK. The attack halted production at multiple sites, affected over 5,000 organisations in the supply chain, and required a £1.5 billion government loan guarantee to stabilise operations. JLR’s wholesale deliveries dropped nearly 25% year-on-year, and recovery is still ongoing in early 2026. (source: SysGroup)

These real-world cases serve as stark reminders that even the most robust internal cybersecurity practices can be undermined if third-party partners and software providers are not held to the same standards. Vigilance, continuous oversight, and a strong supply chain risk management strategy are essential to safeguarding today’s interconnected digital infrastructure.


5 Steps to Reducing Supply Chain Risk

Organisations can significantly reduce their exposure through visibility of suppliers, proportionate due diligence, least‑privilege access, continuous monitoring and robust incident response planning.

  • Supplier Visibility: Maintain an up-to-date inventory of all suppliers, vendors, and third-party service providers. Use standardised risk classification, as outlined by NIST CSF and ISO/IEC 27036, to segment suppliers based on the sensitivity and criticality of their access and services.
  • Proportionate Due Diligence: Conduct thorough risk assessments before onboarding new suppliers, scaling the depth according to their potential impact. Review security certifications, controls, and incident history to align with NIST SP 800-161 and ISO/IEC 27001 requirements for evaluation and ongoing monitoring.
  • Least-Privilege Access: Enforce strict access controls so suppliers only have the minimum necessary access to perform their duties. Both NIST CSF and CIS Controls support the least-privilege principle to limit potential damage from breaches.
  • Continuous Monitoring: Implement real-time monitoring of supplier activities and automated alerts for unusual behavior. Regularly validate supplier security practices through audits, questionnaires, or penetration testing as recommended in NIST and ISO frameworks.
  • Robust Incident Response Planning: Integrate suppliers into your incident response plans by establishing clear communication channels, escalation paths, and joint response exercises. NIST CSF emphasizes the importance of coordinated response and recovery processes that include third-party partners.

By aligning your supply chain risk management with established models like the NIST CSF and ISO/IEC standards, you can effectively identify vulnerabilities, implement targeted controls, and foster a culture of continuous improvement—significantly reducing the likelihood and impact of supply chain cyber incidents.


Get Your Free HackRisk Report

AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.

We’ll perform a full external scan and generate your first HackRisk Report, completely free of charge.

You will receive your HackRisk report within 24 hours. No card details necessary.

Get Your Free Report

How Not To Hit The Headlines in 2026

How Not To Hit The Headlines in 2026: What Recent Breaches Have Taught Us

What Recent Breaches Teach Leaders about Modern Cyber Risk

In 2025, we saw some of the most recognisable brands in the UK and beyond hit the headlines for all the wrong reasons.

Cyber attacks cost the British economy billions each year and the impact is felt far beyond the organisations that fall victim. When a major business is disrupted, the ripple effects reach suppliers, partners, and entire sectors of the economy.

In a recent webinar, Sales Director Adam Myers was joined by CTO Ryan Bradbury to unpack four major breaches – Marks and Spencer, Co-op, Jaguar Land Rover and Oracle – and what they reveal about the evolving threat landscape.

For IT leaders, CISOs and boards, the lessons are clear; cyber security resilience in 2026 is not just about the right tools; it is about removing blind spots, strengthening human behaviour, and maintaining continuous visibility.


When Trust Assumptions Break, Attackers Walk Straight in

Across all four incidents, one shared truth stood out. Attackers are not only trying to force their way through hardened perimeters, they are also exploiting small gaps in identity, communication, and process.

Rather than relying on malware or brute force, threat actors impersonated employees, targeted pressured help desk teams, and leveraged stolen credentials. These tactics work because they exploit human behaviour and the real-world pressures teams face.

For leaders, this reinforces the importance of a cyber security culture where teams feel confident to pause, challenge and verify – and where processes are stress tested, not just documented.


1. Marks and Spencer: Social Engineering at Scale

Generative AI is changing the game. Is it helping defenders more than attackers? Dive into the risks, opportunities, and real-world impact of AI on cyber security.

Dave Mareels, Senior Director of Product Management at Sophos, joins the podcast to explore how generative AI is reshaping the cyber threat landscape.


2. AI and Human Defenders Working Together

The April 2025 M&S breach began with attackers impersonating employees to a third-party IT provider. Attackers acquired passwords through social engineering, bypassing normal checks, and enabling them to move laterally to access data before launching ransomware. 

This incident highlights a reality many leaders recognise. Even with the right technical controls are in place, people under pressure can unintentionally override them. It is why traditional one-off training is no longer enough.

Organisations now need continuous security awareness programmes, realistic phishing simulations, and tabletop scenario testing to prepare teams for high-pressure decisions. 


Cyber Security Tabletop Exercises

Turn incident response planning into a focused, hands‑on exercise.

Combine a posture assessment with phishing simulations, Live Hack demo, and a HackRisk.ai scan in an engaging tabletop session for your leadership team – followed by an executive‑ready report and action plan.

Not role‑play. Real data. Real insight.

Learn More

2. Co–op: When a Pattern Becomes a Playbook

Just weeks later, Co-op faced a near identical social engineering breach. Attackers reused the same techniques because, simply, they work. This reflects a broader trend where criminal groups increasingly share successful approaches, leaked credentials and intelligence, creating an economy built on repetition. 

For CISOs and leaders, this means resilience requires continuous reinforcement. Training cannot be quarterly. Help desk teams cannot rely solely on process. Identity verification cannot rest on assumptions that someone “sounds legitimate”. 

The point is not to blame teams, but to support them with clear processes, role-specific training, and communication channels that make it easy to raise suspicions early. 


3. Jaguar Land Rover: The Hidden Cost of Unknown Exposures

The major August 2025 breach at Jaguar Land Rover was triggered by stolen credentials and allowed attackers to cause a full production shutdown. The real issue wasn’t one single vulnerability, but a chain of exposures that went unnoticed. 

Many organisations still lack full visibility of their internet facing assets or whether their credentials have already leaked. By the time a breach becomes visible, attackers may have been conducting reconnaissance for months. 

This is where continuous attack surface monitoring, dark web intelligence and automated reconnaissance become essential. Annual assessments may provide a snapshot into security, but modern attackers exploit the other 364 days too. 


4. Oracle: A Zero–Day that Exposed Global Organisations

October 2025 saw attackers exploit an unpatched zero-day vulnerability in Oracle’s eBusiness suite, affecting major organisations across the globe. This incident reinforces a tough truth; even highly mature organisations can be vulnerable when assets are not fully inventoried and internet facing systems are not continuously assessed.

For boards, this underlines the value of visibility as a strategic investment. You cannot protect what you cannot see.


What all these Breaches Have in Common

Across all four incidents, one theme appeared again and again; these breaches didn’t stem from a single technical failure. They were the result of gaps between people, process and technology. 

Leaders should consider three strategic priorities: 

  1. Strengthen human resilience
    Modern attacks target behaviour as much as systems. Regular tabletop exercises, redteam engagements and realistic training programmes help teams think clearly under pressure. 
  2. Remove visibility blind spots
    Unknown assets, exposed credentials and unmonitored suppliers are now among the most common root causes of major incidents. Visibility is no longer a technical function, but aboard level priority. 
  3. Treat cyber security as a continuous journey
    Pointintime assessments are valuable, but insufficient. Continuous scanning, dark web monitoring, and real-time risk tracking help organisations act before attackers do.  

Services like Sophos MDR provide expert-led 24/7 threat hunting, detection, and response capabilities to automatically block 99.98% of threats.   


How HackRisk Supports Leadership Decision-Making

Our HackRisk platform is supporting leaders in building proactive security strategies.

Its six interconnected security modules are designed to provide the visibility and continuous oversight the modern threat landscape demands.

Together, these insights create a security picture leaders can confidently act on. It is the difference between reacting to incidents and preventing them.

Only 13 percent of UK businesses assess cyber risks within their immediate suppliers and just 8 percent assess their wider supply chain. Yet, as the Oracle case study shows, devastating breaches now originate through partners long considered low risk.

HackRisk’s Supply Chain Security tools allow organisations to invite suppliers, review their cyber posture, assess accreditations, issue onboarding questionnaires and even run financial credit checks, all in one place. For boards and CISOs, this brings clarity to an area traditionally full of fragmented data and manual chasing.


Final Thoughts for Leaders

As Ryan concluded:

“Organisations are not failing because they are ignoring cyber security. They are failing because they cannot see where it is quietly breaking”.

– Ryan Bradbury, CTO at CyberLab

Attackers are patient. They observe. They exploit moments where process meets pressure. 

Your defences must do the same. Identify blind spots, strengthen your people, and invest in continuous visibility. These are the steps that prevent your organisation from becoming the next headline.

Get Your Free HackRisk Report

AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.

We’ll perform a full external scan and generate your first HackRisk Report, completely free of charge.

You will receive your HackRisk report within 24 hours. No card details necessary.

Get Your Free Report

CSH Transport Success Story

Securing the Logistics Sector from Cyber Threats: CSH Success Story

A CSH Transport Success Story

How CSH Transport Is Leading the Way in Cyber Resilience

As the logistics industry accelerates its digital transformation, the stakes for cyber security have never been higher. From real-time tracking systems to cloud-based warehousing and sensitive client data, third-party logistics (3PL) providers are increasingly reliant on digital infrastructure to deliver seamless, efficient services. But with this reliance comes risk -and the need for robust, proactive cyber defences.

One company that’s setting the standard is CSH Transport and Forwarding Ltd, a UK-based logistics specialist with over 40 years of experience. Operating from key locations in Blackburn and the Port of Goole, CSH is known for its reliability and expertise in dry freight, liquid bulk, hazardous and non-hazardous chemical distribution, and secure warehousing.

Read Case Study

The Cyber Threat Landscape for Logistics

The logistics sector is a prime target for cyber criminals – and the risks are growing more complex by the day.

With increasing reliance on digital systems for fleet tracking, warehousing, and client communications, logistics providers face a unique blend of vulnerabilities. Disruption to transport systems, data breaches involving sensitive contracts or hazardous materials, and ransomware attacks on operational platforms can have far-reaching consequences – not just for the business, but for the entire supply chain.

For CSH Transport, the challenge was clear: protect their Microsoft 365 environment, ensure compliance, and build a cyber security posture that could evolve with the threat landscape. But they didn’t just need a vendor – they needed a partner.

CyberLab delivered more than just tools and technology. They provided a wraparound support model that combined proactive monitoring, strategic guidance, and hands-on expertise. From securing endpoints and hardening Microsoft 365 to guiding CSH through Cyber Essentials certification, CyberLab helped CSH build a cyber security foundation that was not only resilient, but scalable.

This partnership gave CSH the confidence to operate securely in a high-risk sector, knowing they had the visibility, control, and expert support to stay ahead of evolving threats.


A Strategic Partnership for Resilience

CSH turned to CyberLab for a comprehensive, layered security solution. The partnership focused on two key pillars:

  • Microsoft 365 Security Support – CyberLab provided continuous monitoring, patching, and proactive threat detection across CSH’s M365 environment. This ensured vulnerabilities were addressed swiftly and systems remained secure.
  • Cyber Essentials Certification – CyberLab guided CSH through the certification process, helping them implement essential controls and demonstrate their commitment to cyber hygiene and compliance.

This dual approach not only protected CSH’s systems but also reinforced trust with clients and partners – an increasingly important differentiator in a competitive market.

Visibility, Control, and Confidence

With CyberLab’s support, CSH Transport gained far more than just a cyber security solution – they gained a strategic partner committed to their long-term resilience.

CyberLab provided CSH with real-time visibility into their Microsoft 365 environment through automated reporting and threat monitoring, ensuring that potential risks were identified and addressed before they could escalate. This transparency gave CSH the confidence to make informed decisions about their security posture.

But visibility was just the beginning. CyberLab’s quarterly advisory sessions offered CSH a structured opportunity to review their security landscape, assess emerging threats, and plan proactive improvements. These sessions weren’t just check-ins – they were collaborative strategy reviews, tailored to CSH’s evolving operational needs.

What truly set CyberLab apart was the wraparound security support: a dedicated team of cyber security experts on hand to provide guidance, answer questions, and respond rapidly to incidents. Whether it was navigating compliance requirements like Cyber Essentials or fine-tuning their Microsoft 365 configurations, CSH knew they had a trusted partner in their corner.

This combination of insight, strategic advice, and hands-on support empowered CSH to move forward with confidence – knowing their operations were protected, their team was supported, and their cyber resilience was continuously improving.


“Working with CyberLab has been a seamless and highly effective experience. Their expertise in securing our Microsoft 365 environment and guiding us through Cyber Essentials certification has significantly strengthened our overall security posture. The proactive monitoring and responsive support have given us the confidence to focus on delivering exceptional services to our customers, knowing that our systems are protected by a trusted partner.”

– Chris Haworth, IT Manager, CSH Transport & Forwarding


Lessons for the Industry

CSH’s journey offers a blueprint for other logistics providers navigating the cyber threat landscape:

  • Cyber security is not a one-off project – it’s an ongoing strategy.
  • Certification frameworks like Cyber Essentials are more than checkboxes – they’re trust signals.
  • Partnering with experts can accelerate resilience and free internal teams to focus on core operations.

As the logistics sector continues to digitise, companies like CSH are proving that operational excellence and cyber resilience go hand in hand.

Get Cyber Essentials

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Exploring the Dark Web: The Digital Wild West of Cyber Crime Today

The Digital Wild West

Data breaches are increasingly common, and news reports frequently highlight these incidents. Millions of email addresses and passwords have been stolen, sold, and shared across the Dark Web. But what exactly is the Dark Web, and what threat does it pose to organisations?

In this article we journey into the depths of this digital Wild West. Much like the lawless frontiers of the past, the Dark Web is a digital landscape where anonymity and illicit activities thrive beyond the reach of many authorities. We explore what the Dark Web is, its role in cyber crime, and recent reports on data leaks. In addition, we cover measures that organisations can take to prevent their most sensitive assets from ending up for sale on the Dark Web.


What is the Dark Web?

The Dark Web is a hidden part of the internet that operates outside the bounds of conventional search engines and requires specialised software, configurations, or authorisation for access.

While the Dark Web is home to many legitimate companies, it also contains message boards, online marketplaces for drugs, as well as stolen financial and private data. Transactions within this economy are often made with cryptocurrency and are completely anonymous.

The Dark Web is infamous for its role as a hub for illicit activities, providing anonymity to users engaged in cyber crime, data breaches, and other nefarious deeds. It facilitates a vast market for stolen data, compromised credentials, and hacked accounts. With corporate credit cards, criminals can cause financial damage and make unauthorised purchases. The risk is more than just financial damage from stolen credit cards, with employee details criminals can launch more sophisticated and targeted attacks. Phishing attacks are one of the most common attack methods employed by cyber criminals, and could be the entry point for further compromise to your organisation.

The Dark Web is not just stolen credentials, it also harbours platforms where individuals can hire hackers for various malicious purposes, from launching cyber attacks to conducting espionage. If you can imagine it, it’s probably out there on the Dark Web.

Recent reports from sources like CSO Online and the University of Surrey underscore the growing prevalence of cyber criminal activities on the Dark Web, posing significant threats to enterprises and individuals alike.

Tales from the CyberLab

AI’s Role in Data Protection Explained with Forcepoint


Recent Breaches on the Dark Web

Recent data breaches have highlighted the growing market for stolen data and credentials on the Dark Web.

Apple, Google, and Other Major Companies

A huge breach exposed 184 million logins for Apple, Google, and many other companies. The dataset, which was discovered in an unprotected online database, includes usernames and passwords for various online services and email providers. Jeremiah Fowler, a cyber security researcher investigating the database believes that infostealer malware may have been used to obtain and compile the compromised dataset. Infostealer malware is often deployed in phishing emails and malicious websites and used by cyber criminals to harvest data and credentials from systems they have infected. The stolen data/assets are usually then sold on the Dark Web or other illicit marketplaces. (source: PCMag)

AT&T

In another alarming incident, personal data belonging to 73 million current or former AT&T customers was leaked online. The data, including addresses, social security numbers, and passcodes, was published on the Dark Web, prompting concerns over potential misuse. AT&T has initiated an investigation into the breach, although they have not identified evidence of the data being stolen. As a precautionary measure, the company has reset customers’ passcodes and urged them to monitor their account activity and credit reports. The leaked data, which dates back to 2019 or earlier, encompasses information from 7.6 million current customers and 65.4 million former account holders. While financial information was not included in the leak, details such as full names, email addresses, and dates of birth were compromised. Even though the breach happened in 2024, the stolen data is still on the Dark Web and is being repackaged for sale (source: ZNET)

US National Public Data Breach

An enormous amount of sensitive information, including social security numbers for millions of US, UK and Canadian citizens, was stolen and released on the Dark Web. The data breach, believed to be 277.1 gigabytes of data includes names, address histories, relatives, and social security numbers dating back at least three decades. The hacking group claiming responsibility for the breach, USDoD , are apparently selling the stolen data on the Dark Web for $3.5 million. (source: USA Today Tech)

Recent Breaches on the Dark Web

The dark web serves as a digital marketplace for cyber criminals looking to exploit stolen data. Here are some of the malicious activities they can engage in:

Credential Stuffing

Cyber criminals use stolen credentials to gain unauthorised access to accounts by trying multiple username-password combinations.

Fraud

Stolen data can be used to commit various types of fraud, including identity theft and financial fraud.

Ransomware

Ransomware-as-a-service (RaaS) allows criminals to encrypt and lock victims’ data until a ransom is paid.

Distributed Denial-of-Service (DDoS) Attacks

Attackers can use stolen data, such as login credentials or network configurations, to infiltrate systems and hijack devices, turning them into bots within a larger botnet. These botnets are then coordinated to flood a target’s network or server with an overwhelming volume of traffic, causing disruptions, slowing operations, or completely paralysing the system.

Keyloggers, Trojans, and Spyware

Malware tools can be distributed to steal sensitive information from victims.


How to Protect Your Data

If your data has made it on to the Dark Web, acting quickly to assess the risk and mitigate the potential damage is essential. But how do you know if your data is out there? Dark Web Monitoring allows you to monitor any instances of your organisation’s data on the dark web and receive proactive notifications if any information from your domain is found. The platform engine monitors hidden chat rooms, private websites, P2P networks, IRC channels and thousands of botnets.

Continually scanning Dark Web databases for your company’s domain-specific data means you can act quickly if your sensitive information is made available on the Dark Web. With intelligent algorithms, sifting through the vast amounts of information, accurately identifying any instances of your company’s data. When such a potential threat is detected, it provides real-time alerts, enabling you to take immediate action to protect your business.

Few organisations have the right tools, people, and processes in-house to manage their security program around-the-clock while proactively defending against new and emerging threats. As such, organisations should consider getting an assessment of their cyber security posture to identify weaknesses. Another consideration is implementing advanced technologies for threat detection or partnering with a Managed Security Services Provider (MSSP) for services such as Managed Detection and Response (MDR).


In Conclusion

The Dark Web remains a formidable challenge in today’s digital landscape, serving as a haven for cybercriminals to exploit vulnerabilities and trade stolen data. The recent data breaches reveal the sheer scale of data that is vulnerable to being exposed on this digital black market, and underlines the importance of implementing robust cyber security controls and strategies.

By pro-actively and regularly assessing their estate for vulnerabilities, implementing robust detection and response capabilities, continuously monitoring Dark Web channels for any exposed data or credentials, and fostering a culture of cyber awareness and vigilance, organisations can better protect themselves and their informational assets against the ever-present threats posed by the Dark Web.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Retail Under Siege from Cyber Attacks

Retail Under Siege from Cyber Attacks as Criminal Tactics Evolve

What the M&S, Co-op and Harrods Cyber Attacks Reveal About Modern Threats

Recently, a wave of cyber-attacks has struck some of the UK’s most well-known retailers: Marks & Spencer, the Co-op, and Harrods. These incidents have disrupted services, forced systems offline, and cost millions in lost revenue. They are not just unfortunate timing. They are a wake-up call for not just the retail industry, but for every organisation across the UK.

The message is clear, if the “big guys” can fall victim, anyone can.


A Timeline of Disruption

Easter Weekend (29–31 March 2025)

Marks & Spencer was the first to experience a major disruption. Over the bank holiday weekend, the retailer suffered a ransomware attack reportedly carried out by the group DragonForce. The incident forced M&S to take its website and apps offline, halting Click & Collect services and disrupting contactless payments and loyalty programmes.

With online sales accounting for approximately £3.8 million per day in its clothing and home division, the financial impact was immediate and substantial. M&S later confirmed that customer data had been stolen, although it clarified that the compromised information did not include passwords or payment details. [Source: BBC]

Wednesday 7 May 2025

The Co-op revealed that it had taken parts of its IT infrastructure offline in response to suspicious activity, as a precaution against a potential cyber attack. Staff were instructed to keep cameras on during remote meetings and to verify all attendees, a signal that the company feared a deeper network compromise. The full nature and scope of the attack have not been publicly confirmed. [Source: BBC News]

Thursday 8 May 2025

Harrods became the third major retailer to confirm an incident. The company reported attempted unauthorised access to its systems. In response, its IT team restricted internet access at its stores as a protective measure. While its flagship Knightsbridge location and online store remained open and functional, the company has not disclosed further technical details or the extent of the attempted breach. [Source: BBC]

Ongoing Disruption

Cyber attacks are often widely disruptive. Customers at M&S have been unable to shop online for over a month, and reports indicate that disruption could last until July. The disruption of this cyber attack is estimated to cost M&S over £300 million. [Source: BBC]


Why are Retailers Targets for Cyber Criminals?

Retail businesses, especially large chains, have become increasingly attractive to cyber criminals.

  • They manage large volumes of customer data, including payment information, delivery details and login credentials.
  • Their operations are deeply digital, from logistics and inventory management to payment systems and loyalty apps.
  • Any downtime causes immediate and visible disruption, creating pressure to resolve incidents quickly, sometimes under ransom demands.

We Simulated a Breach and It Took Minutes

At the recent Manchester Digital E-Commerce Conference, we conducted a live hack on a demo online store to show how quickly a compromise can occur.

Within minutes, our team exposed:

  • A misconfigured ecommerce website that was vulnerable to exploitation.
  • How an SQL Injection could steal usernames and encrypted passwords.
  • How easily we decrypted the passwords due to weak passwords and poor encryption algorithm.
  • Weak login process with no 2FA which enabled us to access all details on the account – including address and payment information.

Most successful attacks do not rely on sophisticated exploits and threat actors will almost always for the path of least resistance to establish a foothold. They rely on simple oversights, poor digital hygiene or human error.

Even today, the number one, most prevalent vulnerability facing applications globally are broken access controls according to the Open Worldwide Application Security Project (OWASP) [source: OWASP Top Ten]


How Can Organisations Protect Themselves Against Cyber Attacks?

While the recent attacks are concerning, they highlight areas where many organisations can make meaningful improvements. Addressing cyber risk doesn’t require a drastic overhaul or reacting with panic.

Instead, it begins with a focused review of your current cyber security posture. You should review the technologies you use, your internal processes, and your existing policies. The priority should be to identify gaps, understand where your most critical assets lie, and take measured, practical steps to reduce risk.

Some of the key steps you should consider are:

  • Use Multi-Factor Authentication (MFA) across all admin and critical access points.
  • Patch and update all systems regularly, especially third-party plugins and platforms. Utilising patch management software can make this process faster and easier.
  • Use 24/7 log monitoring and alerting tools such as a Security Information and Events Management (SIEM) and Early Detection and Response (EDR) solutions across your applications and endpoints that can detect and record anomalous activity such as repeated attempted login failures in real time.
  • Conduct regular security audits, penetration tests, and code reviews.
  • Segment networks and use monitoring tools to detect abnormal behaviour early.
  • Train staff on phishingsocial engineering, and access protocols.
  • Have an incident response plan in place and test it regularly.


It’s Not “If” But “When”

The recent incidents at M&S, Co-op, and Harrods are not anomalies. They are signs of a threat landscape that is growing more aggressive and opportunistic. For any organisation operating online or relying on digital systems, the risk is very real.

At CyberLab, we help businesses strengthen their defences, uncover vulnerabilities before attackers do, and stay ahead of the threat curve.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Festive Season Cyber Crime

Cyber Crime and the Festive Season: Protecting Businesses During Peaks

A Dangerous Spike in Cyber Threats

As the festive season approaches, the excitement surrounding Black Friday, Cyber Monday, and Christmas shopping often leads to a sharp increase in cyber threats. During this time, online consumer behaviour changes drastically- shoppers are eager for deals, working against the clock, and spending more time online.

This frenzy presents an ideal opportunity for cyber criminals, who take advantage of increased online traffic, distracted users, and businesses operating out-of-hours to launch attacks. For organisations, this shift introduces unique risks and demands heightened security measures.

This month, we are focusing on the elevated cyber risks associated with the festive season. We will explore how cyber criminals exploit holiday shopping habits and changes in consumer behaviour, provide examples of high-profile incidents, and offer best practices that organisations can implement to safeguard their operations during this critical period.


Why Cyber Criminals Love the Festive Season

During peak shopping times like Black Friday and Christmas, cyber crime rises as consumers spend billions online. A recent report by ThriveDX found that ransomware attacks increase by 30% during the holidays compared to regular months.

Cyber criminals know that consumers are often distracted while hunting for deals, leaving them vulnerable to phishing attacks and other scams. According to Forbes, in 2022 37% of data breaches in retail involved stolen payment card data, and ransomware accounted for 24% of breaches, with retailers often pressured to pay to avoid disruptions during their busiest sales periods.

A notable example of cyber criminals exploiting the festive period to steal payment card data is the Target breach, which affected approximately 40 million credit and debit card accounts during the holiday shopping period. The attack, facilitated by malware installed through an HVAC subcontractor, led to widespread customer distrust and hefty fines. This incident is a stark reminder that even well-established businesses with strong security frameworks can fall victim to cyber crime during the holidays.


Top 5 Most Common Threats During the Festive Season

Phishing Scams

Cyber criminals take advantage of consumers’ increased reliance on online shopping by sending emails that mimic trusted brands. These emails often include malicious files or links to fake websites where users unknowingly provide personal and payment information.

A report by DataProt found that over 70% of phishing emails were opened by recipients in 2023, especially during periods like Black Friday and Christmas when consumers are bombarded with promotional emails.

Ransomware

Between December and January, attempted ransomware attacks rose by 70%, as businesses were more willing to pay to prevent operational disruption. The combination of out-of-hours operations and an influx of temporary workers makes organisations more vulnerable to these attacks. [source: Darktrace]

Typosquatting

Cyber criminal websites that resemble legitimate retailers, often relying on common typos in domain names to trick consumers into entering their personal details. During Black Friday and Cyber Monday, these schemes become even more prevalent as users rush to make purchases. [source: Forbes]

Out-of-hours Attacks

According to Darktrace, in 76% of detected ransomware infections, the encryption process begins after hours or during the weekend.

Cyber criminals and threat actors alike often increase attack attempts during off-hours, particularly on weekends or holidays, when fewer staff are available to monitor security alerts in real time, making it easier to exploit standard organisational processes and human vulnerability.

With fewer personnel on-hand to respond, threat actors are often afforded more time to establish a deeper foothold within internal networks before being detected. For example, ransomware attacks tend to peak during these times, knowing that quick responses are more challenging.

AI-Enhanced Scams

The National Cyber Security Centre (NCSC) has warned that AI-generated scams will play a significant role this festive season, producing more polished and convincing phishing emails and fake websites.

According to NCSC, 72% of British people are concerned about AI making it easier for criminals to commit fraud. The misuse of AI to bolster scams, such as creating fake advertisements and fraudulent emails, makes it harder for consumers to discern between legitimate offers and cyber threats. [source: NCSC]


Best Practices to Protect Your Organisation

Due to the rise in cyber threats during the festive season, businesses must remain vigilant and proactive. Here are some best practices to consider:

1. Ensure Regular System Updates and Patching

Cyber criminals often exploit known vulnerabilities, so it’s crucial to keep all software and systems up to date with the latest security patches.

Protect your operating systems and third-party software from vulnerabilities with vRx from Vicarius.

A complete patch management system that discovers, prioritises, and remediates software vulnerabilities across your estate, including the smaller applications that are often forgotten.

2. Strengthen Employee Awareness and Training

Seasonal hires, in particular, are vulnerable to phishing attacks and social engineering as they are typically only contracted to work over the busy festive periods and so are less likely to be fully integrated into organisations’ policies and processes, meaning they may not have as much exposure or training to become vigilant to suspicious behaviours or cyber criminal activity.

Training employees to identify suspicious emails or websites can reduce the risk of human error. Verizon’s 2023 Data Breach Investigations Report found that human error played a role in 74% of breaches, highlighting the need for continual employee awareness. For temporary staff, provide quick, engaging onboarding modules that put emphasise on detecting phishing attempts and other social engineering tactics.

3. Implement Multi-Factor Authentication (MFA)

MFA adds an additional layer of security, which makes it more difficult for attackers to access systems even if they possess stolen credentials. SecurEnvoy helps to fortify your security and reduce the risk of data breaches by keeping track of where your data resides and making sure that only authorised users can access critical systems and information.

4. Monitor Network Traffic

Increased traffic during the festive period can strain your networks. Deploy monitoring tools to detect abnormal activity and prevent distributed denial of service (DDoS) attacks.

5. Consider Managed Security Services

If your business lacks in-house expertise, consider partnering with a Managed Security Service Provider (MSSP) for services such as threat detection and response, penetration testing, and incident response.

6. Dark Web Monitoring

Services such as HackRisk can help detect if any of your organisation’s data has been exposed on the dark web and provide real-time alerts to mitigate risks.

7. Prepare an Incident Response Plan

With out-of-hours attacks more common during the holidays, having a robust incident response plan is critical. Outsourcing to a retainer service, such as those offered by Sophos, can reduce the pressure on internal teams by providing expert guidance in handling incidents.


Conclusion

As the holiday season ramps up, so do the threats from cyber criminals eager to exploit changes in consumer behaviour and the operational vulnerabilities of businesses. By understanding the tactics used by attackers and implementing best practices such as employee training, regular system updates, and robust monitoring, organisations can significantly reduce their risk of falling victim to cyber crime.

Stay vigilant, invest in cyber security measures, and ensure your defences are up to the challenge this festive season. sophisticated cyber threats.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Defending Education

Defending Education: Top Cyber Security Challenges in Higher Education

Cyber Security for Education Institutions

Cyber security has become a critical issue for higher education (HE) institutions due to their unique structures. Academic institutions have open environments where many users access shared networks from various devices and locations.

This makes them prime targets for cyberattacks. Common threats include phishing attacks, ransomware, Distributed Denial of Service (DDoS) attacks, and data breaches. Plus, the rise of remote learning and cloud adoption has increased the potential attack surface for many educational institutions, making it harder to manage cyber security.


Understanding the Threat Landscape

Higher education institutions are attractive targets for threat actors due to their decentralised structures, large user bases, and the diversity of data they store.

Universities, for example, often have open networks to support collaboration and research, creating vulnerabilities and exploitable gaps in infrastructure. They typically hold valuable intellectual property, cutting-edge research, financial data, and personal student/staff information. Additionally, a blend of staff, students, and external collaborators using a range of different devices further complicates security oversight and can make endpoint security management a living nightmare.

Considering all of these factors, Higher Education Institutions appeal to a wide spectrum of motives for threat actors to target them; nation-states may target them for espionage and to obtain valuable research data, while ransomware groups view them as lucrative opportunities due to their reliance on constant system availability for academic and administrative purposes.

In the past year alone, 97% of UK higher education institutions reported cyber incidents, spanning across a wide variety of attack vectors and methods, according to a recent survey by the NCSC.


Key Security & Compliance Challenges Facing Higher Education

Decentralised Structures and User Diversity

Universities host a mix of staff, students, and external collaborators who access networks from various devices. This diversity increases the attack surface, making it harder to monitor and secure endpoints. Additionally, many departments and research teams have different security protocols or lack them altogether, creating inconsistent defences across the institution.

Appeal to Threat Actors: Espionage and Financial Crimes

Higher education institutions hold valuable intellectual property, particularly in research areas such as technology, health, and defence, making them appealing to nation-state actors seeking espionage. Ransomware groups and financially motivated cybercriminals also target these institutions due to the critical reliance on availability, making them more likely to pay to regain access to encrypted systems.

Cyber Security Awareness

With the variety of users and devices, human error is one of the largest vulnerabilities. Phishing attacks are common and can quickly compromise critical systems. Awareness training for students, faculty, and staff is often inconsistent or lacking.

Securing Research Data and Intellectual Property

Beyond financial crimes, universities are repositories of cutting-edge research and data. This makes them attractive targets for espionage, particularly for international competitors seeking technological advantages.


Best Practices and Recommendations for Higher Education Institutions

To effectively combat cyber threats, higher education institutions must adopt a proactive and tailored cyber security strategy. This begins with conducting a comprehensive risk assessment to measure their overall cyber security posture, but also to understand what makes their institution an attractive target specifically.

Universities and colleges should consider the assets they hold—whether it’s sensitive student data, valuable research project data, or intellectual property. Furthermore, institutions need to evaluate their relationships with external collaborators, including research partners, government agencies, and private corporations, as these partnerships may expose them to additional risks.

Geographic location can also influence the threat landscape, particularly if the institution is involved in research or collaborations that are of interest to state-sponsored actors. People of interest who teach among faculties or attend universities can attract both influence and risk. The NCSC has published guidance for HE institutions supporting VIPs and high-risk individuals.

With the right guidance and expertise, information security teams, compliance teams and other internal stake holders can identify where their biggest risks are within their estate, the most likely threat actors to target them, and thus the most likely methods and techniques they are to deploy, ultimately providing a “blueprint” for an optimal cyber security strategy and posture hardening.

With this understanding in place, universities can then implement best practices such as:

Adopting a Zero Trust Architecture

This approach assumes no user or device is trusted by default, even if they are already inside the network. This approach is especially crucial for higher education institutions, given their vast, open networks, with users accessing resources from diverse locations and devices.

Example in Higher Education: Universities can implement micro-segmentation within their networks to limit the movement of attackers if a breach occurs. For example, restricting student access to sensitive research databases or administrative systems through segmented network zones can prevent unauthorised access, even if an attacker has already breached one area.

Another common practice is continuous authentication, where the system regularly checks user credentials and behaviour, such as location, device type, or network usage, to identify any anomalies that could indicate a breach.

The University of California, Berkeley has adopted a Zero Trust approach by implementing secure, role-based access controls for its academic resources, minimising access privileges for non-administrative users. Their system continuously verifies user identity, reducing the risk of lateral movement by attackers. [source: The University of California, Berkeley]

Strengthening Access Controls

Implementing Multi-Factor Authentication (MFA) and Role-Based Access Control (RBAC) ensures only authorised individuals have access to critical systems and data.

MFA requires users to present two or more forms of verification (something they know, something they have, and something they are). This is particularly effective in defending against phishing attacks, which are highly prevalent in higher education.

Example in Higher Education: Implementing MFA across university systems for both students and staff can prevent unauthorised access even if login credentials are stolen. For example, universities can require students to verify their identity using a mobile app or a hardware token in addition to their password.

The University of Oxford rolled out a university-wide MFA system, requiring all staff and students to authenticate using both their university credentials and an additional form of verification, such as a mobile phone app or security token. This has drastically reduced successful phishing attacks by ensuring that stolen passwords alone are not enough to gain access. [source: The University of Oxford]

Regular Software Updates and Endpoint Protection

Ensuring that all devices, including personal ones used for work (BYOD), have up-to-date antivirus and firewall protection is crucial. Regular software updates are vital to patch known vulnerabilities. Additionally, enabling remote wipe capabilities for lost or compromised devices ensures sensitive data can be erased quickly.

Phishing and Social Engineering Awareness Training

Employees are often the first line of defence against cyber threats. Regular training sessions on phishing, social engineering, and secure data handling can significantly reduce the risk of human error leading to a security breach.

Collaborating with External Cyber Experts

Partnering with cyber security experts, especially in the field of penetration testing, Managed Security Service Providers and Incident Response, or government agencies can provide higher education institutions with real-time threat intelligence, access to advanced security technologies, insights into vulnerabilities and misconfigurations across their estate and provide assurance that their assets and users will be safeguarded in the event of a cyber attack or data breach.

Managed Detection and Response (MDR)

Endpoint detection alone is no longer sufficient given today’s digital threat landscape. Organisations must now employ an “always-on” threat detection and monitoring capability. However, employing and retaining qualified cyber security analysts and engineers can be very expensive. Running a 24/7 SOC (Security Operations Centre) in-house with experienced analysts and security experts with state-of-the-art defensive technologies are typically reserved for multi-national conglomerates and global tier 1 banks.

MDR services provide continuous monitoring and analysis of an organisation’s entire estate, including endpoints, network traffic and activity logs. By outsourcing to experts, firms can ensure that threats are detected and mitigated in real-time, reducing the risk of a successful attack.

Incident Response and Recovery

Having a robust incident response plan is essential for mitigating the damage caused by cyber incidents. Higher education institutions should invest in both in-house and outsourced incident response teams to ensure a swift and effective reaction to breaches and conduct regular assessments of their cyber incident response plans (CIRP) or ‘tabletop exercises’ simulating various cyber incident scenarios to ensure that their response strategies are robust and understood by all risk owners.

Vulnerability Management

Regularly updating and patching software, coupled with continuous vulnerability assessments, is vital for maintaining a secure infrastructure. Cyber security as a Service (CSaaS) solutions, such as HackRisk can help organisations manage vulnerabilities effectively without overburdening internal teams.


Conclusion: Proactive Defence in Higher Education

To safeguard the wealth of data and intellectual property, higher education institutions must adopt a proactive, layered approach to cyber security. By addressing the unique challenges of decentralised networks and diverse users, universities can build a strong defence against increasingly sophisticated cyber threats.

Common Cyber Security Challenges in Education

Here are some key findings detailing the quantity of different types of cyber-attacks that further education colleges and higher education institutions have encountered over the past 12 months:

Phishing Attacks

Phishing attacks were extremely common across both sectors, with 100% of higher education institutions and 97% of further education colleges reporting incidents.

Impersonation Attacks

90% of higher education institutions and 78% of further education colleges experienced impersonation attacks, where attackers pretended to be from the organisation.

Viruses, Spyware, or Malware

Higher education institutions reported significantly higher incidents of viruses, spyware, or malware (77%) compared to 32% in further education colleges.

Access

Higher education faced more issues with unauthorised access to files or networks, with 27% of breaches caused by staff and 20% by outsiders. For further education colleges, 19% involved staff, but 0% by outsiders.

Other Breaches or Attacks

There was a considerable difference in miscellaneous breaches or attacks, with 47% of higher education institutions and 16% of further education colleges reporting incidents outside the standard categories.

[source: NCSC]

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Cyber Security Challenges Within The Public Sector

Cyber Security Challenges Within the Public Sector and How to Respond

How Threat Hunting and MDR Are Shaping Public Sector Resilience

The UK’s public sector – spanning the NHS, central and local government, emergency services, and education – is increasingly targeted by cyber criminals.

With digital transformation accelerating post-pandemic, the stakes have never been higher. According to recent government reports, ransomware attacks have cost public bodies over £1 million per incident, and more than 25% of breaches go undetected for months.


Key Challenges in the Public Sector

1. Skills Shortages

Public sector organisations face a critical shortage of cyber expertise. One in three cyber roles remains vacant or filled by costly contractors, and many departments lack senior digital leadership.

2. Financial Constraints

Budget pressures make it difficult to invest in proactive security measures. Yet prevention remains far more cost-effective than remediation.


The Solution: Sophos MDR

Sophos Managed Detection and Response (MDR) offers 24/7 threat hunting and incident response, bridging the skills gap and providing scalable protection. It combines AI-driven detection with human-led analysis to:

  • Proactively hunt and validate threats
  • Assess severity and business impact
  • Contain and neutralise attacks remotely
  • Provide root cause analysis and remediation guidance

Deployment options include:

  • Notify: Sophos alerts your team to threats
  • Collaborate: Joint response with your internal team
  • Authorise: Sophos handles containment and informs you of actions taken

This flexible model ensures public sector organisations retain control while benefiting from expert support.

Learn More

Protect the Public Sector: Understanding Security Frameworks & Log Management


Real-World Applications

Healthcare

An NHS Ambulance Trust adopted Sophos MDR to ensure uninterrupted access to patient data and services. Building an in-house 24/7 SOC was cost-prohibitive, making MDR a practical alternative.

Education

A leading independent school implemented Sophos MDR to protect student data and avoid ransomware-related downtime. Their proactive stance ensured continuity in teaching and learning.

Housing Associations

CyberLab has supported housing providers in deploying MDR to safeguard resident data and maintain operational integrity. These organisations now benefit from continuous monitoring and expert threat response.

Read Success Stories

Summary

The UK Government Cyber Security Strategy calls for a shift from reactive to proactive security across the public sector. Sophos MDR enables this transition by delivering round-the-clock protection, addressing talent shortages, and supporting digital resilience.

CyberLab is proud to support public sector clients across healthcare, education, housing, and government. As Sophos Public Sector Partner of the Year for ten consecutive years, and with a team of CREST and CHECK-certified testers, we’re here to help you strengthen your cyber defences.

Sophos Managed Detection and Response (MDR)

Where others stop at notification, Sophos MDR takes action.

Few organisations have the right tools, people, and processes in-house to manage their security program around-the-clock while proactively defending against new and emerging threats.

Unlike other MDR services which simply notify you of suspicious events, Sophos MDR provides an elite team of threat hunters and response experts to take targeted actions on your behalf to neutralise even the most sophisticated threats.

Learn More

Top Five Cyber Incidents of 2024 New

Top 5 Cyber Attacks of 2024: Even The Mighty Can Fall in Minutes

Even the Mighty Can Fall: The Top Five Cyber Incidents of 2024 So Far

Ministry of Defence, Microsoft, and more!

As we approach the halfway point of 2024, we have already witnessed several significant cyber incidents that have had far-reaching impacts on major global organisations. These incidents have led to the likes of the MITRE, Microsoft and even the Ministry of Defence (MoD), having to answer uncomfortable questions as to how these incidents occurred.

In this blog, we highlight the top five cyber incidents of the year so far, examining what happened, who was affected, the fallout, and the broader implications for cyber security practices. Join us as we cover these major cyber incidents and explore the lessons we can learn from them.


Chinese State-Sponsored Cyber Attack Campaign

Hackers backed by China’s government spy agency have been accused by the US and UK of conducting a year-long cyber-attack campaign, targeting politicians, journalists, and businesses. The campaign, attributed to a Chinese state-sponsored hacking group, aimed to steal sensitive information, and disrupt critical infrastructure. These coordinated cyber attacks reveal the growing threat posed by nation-state actors and the need for international cooperation to combat hostile nation states or state backed cyber threats effectively. [source: The Guardian]

These attacks highlight that cyber threats don’t just originate from opportunistic cyber criminals, they also have the power of nation-states behind them. Organisations need to ensure they are regularly reviewing their cyber security posture to ensure that cyber defences are up to date and current best-practices are followed. A cyber security posture assessment can highlight the strengths of your organisation’s defences and also indicate where you should focus for improvement.


Ministry of Defence Data Breach

In a significant data breach reported earlier this month, personal information of an unknown number of serving and former UK military personnel was accessed through a payroll system used by the Ministry of Defence (MoD). The compromised data includes names, bank details, and, in some cases, personal addresses. The breach, which targeted a system managed by an external contractor, did not involve any operational MoD data. Immediate action was taken to take the system offline, and investigations are ongoing. Defence Secretary Grant Shapps is set to outline a response plan, which will include measures to protect affected individuals.

Whilst it has still not been revealed as to who is behind the attack, this incident highlights the importance of securing supply chains and systems managed by external contractors and demonstrates how easily vulnerable products can leave even the most mature organisations exposed to persistent threat actors.


MITRE R&D Network Penetrated

In another unfortunate tale of supply chain security, MITRE disclosed a significant cyber-attack in April 2024, orchestrated by state-sponsored hackers that exploited zero-day vulnerabilities in Ivanti VPN software.

MITRE are a key player in R&D for US government projects and authors of the widely adopted MITRE ATT&CK framework . The attack, attributed to a Chinese cyber espionage group known as UNC5221, targeted MITRE’s NERVE (Networked Experimentation, Research, and Virtualization Environment) an unclassified network used for research and development.

The hackers leveraged vulnerabilities CVE-2023-46805 and CVE-2024-21887, deploying sophisticated malware such as BrickStorm and BeeFlush, and used compromised administrator credentials to create rogue virtual machines.

This breach again underscores the critical importance of supply chain security, as vulnerabilities in third-party products can serve as entry points for significant cyber attacks. Organisations looking to prevent these types of attacks should have rigorous vulnerability management and ensure they are using supply chain risk assessments to determine the best third-parties to work with.

Despite maintaining persistence and attempting lateral movement within the NERVE infrastructure, the attackers failed to access other resources. This highlights the importance of architecture and configuration as although the hackers got in, their movement within the network was restricted and therefore reduced the damage these cyber criminals could do.


Microsoft Azure Data Breach

According to an article posted by Spiceworks, Microsoft’s premier cloud service, Azure, suffered a data breach in February 2024 affecting hundreds of executive Azure accounts, raising concerns over the security of big cloud-based platforms. The breach revealed critical vulnerabilities in Microsoft’s security measures, similar to previous incidents.

The attackers exploited a zero-day vulnerability, CVE-2024-21410, in Microsoft Exchange servers, which allowed them to access and misuse Windows NT Lan Manager (NTLM) hashes to impersonate legitimate users. Up to 97,000 Exchange servers are vulnerable to this flaw, which has a severity rating of 9.1. Additionally, Microsoft disclosed two more zero-day vulnerabilities: CVE-2024-21412, a security feature bypass, and CVE-2024-21351, a SmartScreen bypass vulnerability. These issues affected Exchange server versions before the February 13th update.

The perpetrators are believed to be hacking groups from Nigeria and Russia using proxy services and phishing links embedded in documents, primarily targeting mid and senior-level executives. This attack, involving user impersonation, data extraction, and financial fraud, marks the first time such a breach has occurred on the Azure platform.

Microsoft has since implemented measures to mitigate the impact of the breach and enhance the security of its cloud services. This incident brought Microsoft back under fresh scrutiny as a similar incident occurred in 2023 where Chinese-backed hackers were able to access sensitive data stored within the Azure platform [source: NPR]

These two incidents underscore the importance of regular vulnerability scanning and patch management. Organisations looking to mitigate risks from outdated software and zero-day vulnerabilities should ensure they have a robust patch management process and conduct regular vulnerability scans across their infrastructure and applications to maintain the integrity of their estate.

With such a vast and evolving suite of customisable products and features, it can be hard to stay up to date with the most recent security recommendations for Microsoft 365. In a Microsoft 365 Security Assessment, CyberLab can help you ensure security in your day-to-day operations by reviewing your MS365 configuration against industry-standard benchmarks from the Centre for Internet Security (CIS).


Cyber Attacks on NHS Dumfries and Galloway

Digital transformation has revolutionised processes and information management, especially within the healthcare sector. However, with these advancements come significant cyber security challenges.

NHS Dumfries and Galloway faced significant disruptions due to a cyber attack targeting its systems. The attack, which occurred in early 2024, prompted concerns over the security of sensitive healthcare data and patient records.

While details about the nature and extent of the breach remain limited, the incident underscores the persistent threat posed by cyber attacks on critical infrastructure, particularly in the healthcare sector.

Learn about the complexities of securing healthcare organisations amidst the evolving threat landscape and discover the strategies to mitigate risks in our Securing Healthcare Organisations blog.


In Conclusion

In conclusion, the top five cyber attacks of 2024 so far serve as a stark reminder of the evolving threat landscape. By understanding these incidents and implementing a layered and strategic approach to cyber security, organisations can better protect their people, data, and customers.

Stay vigilant, continuously update your defences, and ensure your incident response plans are robust to safeguard against future cyber threats.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation

Exploiting ChatGPT

Exploiting ChatGPT: The Darkside of AI and Emerging Cyber Threats

How Cyber Criminals Are Weaponising AI

Artificial intelligence (AI) being used for malicious intent has surfaced as a significant concern within the digital spaceCyber criminals are using Large Language Models (LLMs), like ChatGPT, and deepfake technology to launch cyber-attacks and scams. In this blog, we focus on the darker facets of AI, shedding light on the exploitation of AI systems, its impact on the threat landscape, and what organisations can do now to better protect themselves and their most sensitive assets against this new wave of threats. 

Malicious ChatGPT Prompts for Sale on the Dark Web Marketplace 

  • Recent reports reveal a disturbing trend where thousands of malicious prompts designed to jailbreak and exploit AI are up for sale on the dark web. These prompts deceive AI models, enabling threat actors to steal data, orchestrate sophisticated scams and other illegal activities with alarming efficiency. 
  • According to recent research carried out by Kaspersky, thousands of these nefarious prompts and compromised premium ChatGPT accounts are now available for purchase, posing a significant threat to ChatGPT, its users and their data. (source: The Register) 


Deepfake and AI: Partners in Crime

AI and deepfake technologies are becoming more readily available. OpenAI, for example, recently announced their new generative AI, Sora, that can create video from text. And, although this advancement in technology and its availability is exciting, it is also inevitable that there will be cyber criminals looking to use it maliciously. 

Around the globe we are already seeing examples of these technologies being exploited by advanced threat actors, including cyber criminals, nation states or nation sponsored hacker groups. 

$25 million theft executed through a sophisticated deepfake scam

A recent article by Ars Technica has shed light on a ground-breaking cyber crime incident considered to be the first successful heist of its kind: a $25 million theft executed through a sophisticated deepfake scam. The scam involved the creation of highly convincing AI generated deepfake videos, which were used to impersonate key individuals within a financial institution.  

By leveraging these deepfake videos, the scammer manipulated employees into authorising fraudulent transactions, resulting in the substantial loss. This unprecedented heist marks a significant escalation in the sophistication of cyber criminal tactics, underscoring the evolving threat landscape faced by organisations worldwide. As the prevalence of AI-driven scams will inevitably continue to rise, it becomes increasingly crucial for businesses to bolster their cyber security posture and remain vigilant against such deceptive schemes. 

Deepfake news segments 

Iran-backed hackers had recently disrupted TV streaming services in the United Arab Emirates (UAE) by injecting deepfake news segments into the broadcasts according to The Guardian. These deceptive deepfake videos, generated using AI technology, were designed to resemble legitimate news reports, spread misinformation, and sow discord among viewers. This incident underscores the growing threat posed by state-sponsored threat actors and the increasing weaponisation of deepfake technology for political purposes.  

As nations continue to grapple with the challenges of cyber warfare and disinformation campaigns, it becomes imperative for governments to collaborate and implement international legislation that both prohibits and protects against the use of such attack methods, as well as educate and inform organisations across all industries about AI threats and how best to protect themselves and their assets. Additionally, organisations need to enhance and adapt their cyber security capabilities to be able to identify and defend against orchestrated AI driven attacks, which is backed up by a recent assessment conducted by the NCSC. The assessment focuses on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years. (source: NCSC) 

Tales from the CyberLab: Generative AI in Cyber Security Explained


Global Cyber Threats Expected to Rise With AI, NCSC Warns

According to the above-mentioned assessment by the NCSC, AI is poised to significantly impact the cyber threat landscape in the near future. The report suggests that AI will almost certainly be utilised by cyber adversaries to enhance their capabilities, including the development of more advanced attack techniques and procedures (TTPs).  

As AI technologies evolve, cyber criminals are increasingly going to automate tasks, evade detection, and execute targeted attacks with greater precision. This assessment underscores the urgent need for organisations to adapt their cyber security strategies to effectively mitigate the evolving threats posed by AI-driven cyber-attacks. This includes enhancing detection and response capabilities, investing in AI-powered security solutions, enforcing zero trust policies, implementing a culture of sufficient cyber awareness and vigilance amongst staff, and staying informed about emerging AI-driven threat vectors. 

While ChatGPT and other LLMs may not yet be capable of being used to write sophisticated malware to be sold at scale on the dark web or be in possession of nefarious nation states, we may not be far away from AI being used to orchestrate attack chains or write malware that can evade detection. A separate recent report from the National Cyber Security Centre (NCSC) sheds light on how AI driven ransomware attacks could become a reality by 2025. (source: NCSC)


What Can Organisations do to Protect Themselves Against AI Threats?

As AI technologies are rapidly evolving, the application of its use for both good and bad is evolving with it, leading to a rapid shift in the threat landscape. It is imperative for organisations to not just understand how to defend against AI driven threats, but to learn how to use AI technologies securely and in a manner that best protects their assets and does not expose them to new vulnerabilities or risk. 

Already we are seeing collaboration amongst the international community to tackle this very issue. A recent publication on how to engage with Artificial Intelligence has been developed by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) in collaboration with the NCSC, United States (US) Cyber security and Infrastructure Security Agency (CISA), Canadian Centre for Cyber Security (CCCS) and several other cyber security/government agencies from international partners. The publication highlights some key threats related to AI systems and summarises steps organisations should take when engaging with AI technologies (both in-house and 3rd parties) to mitigate risk. (source: ASD’s ACSC) 

While this new wave of advanced threats seems daunting and paints a bleak future for stakeholders responsible for managing risk, there are several steps organisations can do to protect against these threats. Many of these types of attacks still rely on the presence of human error and social engineering. Regularly training your people and creating a positive cyber awareness culture are key to reducing this type of threat.

Further to this, unsecured vulnerabilities are a common route of entry for cyber criminals and can be identified with regular vulnerability scanning and penetration testing to identify your security weak spots.

Organisations across all sectors, of all sizes should not neglect the fundamental steps that make up the foundations of any cyber security strategy. Few organisations have the right tools, people, and processes in-house to manage their security program around-the-clock while proactively defending against new and emerging threats. Adopting security defences like Sophos MDR can provide an elite team of threat hunters and response experts to take targeted actions on your behalf to neutralise even the most sophisticated threats.

Tales from the CyberLab: AI’s Role in Data Protection Explained


In Conclusion

For better or worse, AI is going to change how we live our lives greatly, and while its application for solving huge problems on a global scale is something to be embraced, we should also be aware of its capacity to cause great harm. Organisations need to adapt to the new world of AI driven technologies and attacks, whilst continuing to invest in the foundations of their cyber security posture.

Free Posture Assessment

Understand your security risks and how to fix them.

Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.

Claim your free 30-minute guided posture assessment with a CyberLab expert.

Claim Free Consultation