top of page


  • Chris Bratton - Tech Journalist

The UK and US are stepping up critical infrastructure protection against Russian cyberattacks

Typical cyberattacks have sophisticated defence mechanisms within the organisations. Not all government entities are specially designated to handle IT functionalities. But a few dedicated organisations currently handle these tasks and perform regular monitoring.

Today our world is not the same it was two years ago. We went through a deadly coronavirus. At the moment of recovery, wars are kicking in. if that war only brings tanks and guns, there are communities of global leaders who would take proper action. But against cyber-attacks, which know no bounds.

Many countries look up to global tech leaders in the UK and the US regarding technological advancements, research, discoveries, and, most importantly, defence mechanisms. Now politics of war is handled with care so that it doesn't go out of hand. It could simply be the start of a full-scale nuclear war, a day of doom.

Cyber-attacks can infect counties on the left and right without caring for any boundaries. As global leaders, the US and the UK must keep regulations in check. The Russia Ukraine conflict gave birth to unprecedented cyber warfare.

According to the US cyber department, two separate incidents made recorded between 2012 and 2018. It primarily targeted critical infrastructure. A hit on the critical infrastructure can cause trouble for days. Not for the people trying to fix it or the ones having responsibility but also for individuals dependent on it.

"Conspiracies" were unveiled by both the UK and the US in 2017, which stopped some attacks on critical infrastructure. Similar cyber attacks are pretty standard as hacker groups try to make a name for themselves by attacking big firms. According to the US Department of Justice (DoJ), the Russian Ministry of Defence research institute was behind the Saudi facility attacks. Similar operations revealed US infrastructures as targets.

Most overseas attacks come in ransomware, malware and other deadly variants. Even though we are not unfamiliar with DDoS (distributed denial-of-service), it is not as severe as the organisation's critical infrastructure facilities consider before going public. Smaller companies and even large firms that are not as competent in the IT industry fall victim to it.

The government of the UK made a filing back in 2021 April that the UK and the US exposed a global campaign of malign activity by Russian intelligence services. Concerns were raised as it was a continuous pattern by the Russian Foreign Intelligence Service (SVR) that was also behind the SolarWinds compromise.

Foreign Secretary Dominic Raab talked about undermining the democratic systems, and they are calling out "Russia's malicious behaviour" as a way to "better defend and prepare."

Deputy attorney general Lisa O. Monaco said, "Russia state-sponsored hackers pose a serious and persistent threat to critical infrastructure in the US and worldwide." Past activities were handled differently. The government made the best of their internal connection to keep hackers and activists out of their critical services. But now, the war is almost spreading against nations, and things are getting serious. It is not about getting the name out there anymore; it is now about pursuing political gains via distributed attacks.

Ukraine is going through cyber-attacks, CISA is issuing warnings, and big-tech providers are stopping services in Russia, fueling rage from all sides. We briefed on Russia's waning Alphabet to stop threatening Russians on YouTube in a recent publication. Please do check these stories if you haven't to unveil more information on the happenings in the cyber world.

The Colonial Pipeline attack was the most significant threat last year. One of the highest-profile infrastructures was compromised. In just 2021, the US recorded 649 ransomware attempts in its critical infrastructure.

An additional support request was sent out by president Biden this week, on which the UK' National Cyber Security Centre (NCSC) responded to join leagues. Organisations are given warnings and measurements to stay safe in the conflict of cyberwar.


bottom of page