The key cyber-threat trends for the duration of COVID-19 and how they will have an impact on the UK going ahead were being reviewed by Eleanor Fairford, head of incident administration at the National Cyber Security Centre (NCSC), for the duration of the keynote session on day two of the Infosecurity Europe digital meeting.
Fairford commenced by describing the new possibilities that the COVID-19 pandemic has presented to cyber-criminals and nation-condition actors. Cyber-criminals have been able to “make the most of people’s vulnerabilities during this interval and the elevated risk area that was presented by anyone doing the job from property.” And for hostile country-states, the pandemic presented additional chances to steal really delicate details from other governments to achieve an gain over them, these as vaccine development.
She outlined the 3 places NCSC regard as the biggest cyber-attack traits of 2020: cyber and fraud through COVID-19, the SolarWinds offer chain attacks and the proliferating ransomware threat.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Cyber and Fraud Through COVID-19
In phrases of cyber and fraud, Fairford discovered that during 2020, the NCSC observed far more on the internet ripoffs “than in the previous a few several years mixed.” Unsurprisingly, quite a few have been similar to the COVID-19 pandemic – outstanding illustrations include faux superstar endorsement ripoffs, vaccine adverts and faux online shops purporting to sell healthcare products or even COVID-19 ‘cures’. She added: “These are the sorts of tactics that really preyed on people’s vulnerability.” This is since of the massive toll the pandemic has had on locations like overall health and the economy, earning men and women significantly extra nervous than they would commonly be, and thus extra liable to be tricked.
Fairford also highlighted new steps the NCSC has taken to mitigate these cons and guard people today and organizations. These incorporate updating its energetic cyber-protection tools and actions, “which are getting rolled out as commonly as probable to offer a baseline amount of protection.”
According to Fairford, the NCSC has emphasized guarding the NHS, the vaccine supply chain, and investigation institutions in this period. This features checking for tries to harvest NHS credentials in purchase to spoof this establishment through phishing. In whole, the NCSC observed 122 phishing campaigns in 2020 that employed NHS branding, producing them look real. This in comparison to just 36 in 2019.
Fairford outlined one more essential initiative released by the NCSC last calendar year to tackle the risk of on line cons. This is the Suspicious Email Reporting Company, “which allows customers of the community to send into the NCSC emails they experienced gained which looked like phishing emails.” This has proven remarkably effective so much, with about 6 million reviews obtained as of Might 31 2021, top to the removing of much more than 45,000 cons and 90,000 URLs.
Encouragingly, Fairford explained the NCSC took down nearly 30,000 COVID-19-themed attack teams final year by yourself.
SolarWinds Attack
She then moved onto the SolarWinds attacks that took area at the stop of 2020, which she explained as “the essential cyber-espionage act of the previous ten years.” This incident, believed to have been perpetrated by Russian point out-backed actors, was significantly “unique and noteworthy,” in accordance to Fairford. This was mainly owing to the process utilised by the risk actors to compromise SolarWinds and subsequently allow them to obtain the methods of up to 180,000 of its customers.
This was reached by interfering with SolarWinds software package updates, which means that “as you routinely current your SolarWinds offer, you would put in a tampered update, and that offered a backdoor into your network.” She, thus, noted that all clients that comply with steerage on patching and setting up updates “were more most likely to be a target of this particular attack.”
Aspect of the novelty of this strategy was that expert services remained unaffected, making it possible for attackers to go by way of influenced organizations’ devices unnoticed for a pretty very long time. In its subsequent analysis of the incident, she added that the NCSC observed “high stages of operational security techniques” currently being utilized by the attackers, together with wiping all traces of their activity.
Fairford believes the attack may effectively have remained undetected had it not been for FireEye’s initial discovery in December 2020.
“It straight interrupts people’s accessibility to workplaces, understanding and critical products and services”
The Surge of Ransomware
Unlike SolarWinds, in which the perpetrators operated driving the scenes and caused no disruption to any providers, ransomware attacks have been proven to have a massive effects on folks and organizations, primarily in the past calendar year or so. Fairford commented: “It specifically interrupts people’s access to workplaces, discovering and critical services so this actually does build an effect on people’s life.”
She outlined two significant incidents on area authorities in the UK previous calendar year – Redcar & Cleveland and Hackney councils. Both of those led to extreme effects: in the Redcar scenario, on-line public solutions were unavailable to 135,000 regional residents for in excess of a 7 days and full restoration expenses exceeded £10m, while in the Hackney council situation, delicate personalized knowledge of staff and people ended up getting revealed on the dark web.
There has also been significantly weighty targeting of hospitals and other healthcare establishments since the start out of COVID-19, including the modern attack on Ireland’s healthcare support. Fairford also cited a ransomware attack on a healthcare facility in Germany very last yr, which likely contributed to the loss of life of a critically sick client who had to be redirected to one more clinic.
At last, Fairford mentioned the current ransomware attack on the Colonial Pipeline corporation, which led to the US’ largest fuel pipeline remaining taken offline. This shown the considerable risk that ransomware poses to countries’ critical national infrastructure. A ransom of $4.4m was paid to the attackers, but pleasingly, the bulk of the money has reportedly been seized by the US Division of Justice.
Fairford also highlighted how ransomware teams are turning into more and more professionalized in their techniques, with quite a few even “behaving like a innovative business enterprise-type operation.” In one example she gave, a group even has its have checklist of FAQs, detailing how victims must behave in the celebration of an incident.
Fairford concluded by outlining how these tendencies are predicted to influence the UK cyberspace about the coming calendar year. First of all, she thinks “the health and fitness sector will continue on to be a precedence goal for country condition functions, especially as exploration carries on into variants and vaccines,” even though disinformation strategies similar to the pandemic are likely to even now be closely used by destructive actors. Furthermore, it is predicted that ransomware will continue on to proliferate, together with the expansion of the double extortion tactic.
A different location she thinks will mature are provide chain attacks, with SolarWinds demonstrating just how successful these can be to compromise a big amount of companies globally. Last but not least, Fairford mentioned she expects to see in depth focusing on of “UK companies that are definitely at the forefront of items like rising systems.”
Some components of this report are sourced from:
www.infosecurity-magazine.com