UK-Russia Geo-Poli-Cyber™ Warfare Escalates. | Pro-Russian Hacker Group Cyber Attacks Britain’s Banks, Councils & ‘Jewel in the Crown’ BAE Systems in Retaliation to UK’s £120M aid for Drones to “Protect Ukraine Grain Corridor”.

On face value, one might think that a cyber attack is a cyber attack, especially that in most, if not all financially-motivated  cases, the perpetrators go to great lengths to hide or fake their identity. The total opposite is the case when they are Geo-Poli-Cyber™ motivated.

UK-Russia Geo-Poli-Cyber™ Risks, Threats & Warfare Escalate. 

On October 22, 2024, the UK government published a press release on its UK government website with the title “Prime Minister warns Russian threat to global stability is accelerating as Putin ramps up attacks on Black Sea”.

Readers would have been excused for not bothering to read it as tit read and sounded similar to the same rhetoric they have seen at least 100 times in the past.

But something new and significant was buried deep into that press release and its said:

Most, if not all British and western media outlets did not cover or report on this paragraph in this press release, except a couple of Ukrainian outlets. On Oct 23, 2024, The Kiev independent published a post with the headline:

This clearly did not go unnoticed by the Russians and their cyber supporters. One key player who took one step further was the Pro-Russian Group NoName057(16).

NoName057(16) posted on its X their clear thoughts of the UK Government’s “£120M ($155M) donation” saying:

The Russian embassy in the UK has accused the British authorities of using the issue of grain corridor protection to conceal arms deliveries to the Ukrainian Armed Forces. According to the diplomatic ministry, the deliveries are carried out with the help of third-country dry cargo ships, which, in Russia’s opinion, is recognized by the British themselves. On October 22, Prime Minister Keira Starmer announced $155 million to support Ukraine’s naval forces, including one hundred maritime drones and radar stations🤬.

While the russophobic UK authorities continue to sponsor the criminal Kiev regime, we are launching our attacks on that country’s websites😈”

Then, NoName057(16) proceeded to cyber hit many Key British political, economic and military defense targets.

Which UK Targets Were Hit?

Banks, Councils, and the Jewel in the Crown in UK defense and its Trident Nuclear Deferent, BAE Systems, were hit.

Councils such as Greater Manchester. Salford, Bury, Trafford and Tameside.

Banks such RBS, Nationwide and others.

“Unprecedented” DDoS Attack.

The cyber attacks were not only successful but also “Unprecedented”. This is despite UK National Cyber Security Centre (NCSC) spokesperson calling the DDoS attacks “relatively low in sophistication” but yet, they successfully flooded their targets’ websites with internet traffic to put render them inoperable.

The attacks fooled world class DDoS defense systems not to get triggered until it was too late and after the damage was already done.

The Unprecedent manner that made these attacks successful to fool cyber defenses was in the way they were designed to perpetrate their targets.

All targeted banks’ and councils’ DDoS defenses, especially those of BAE Systems, failed to identify that an attack was on going. They then failed to trigger immediate remediation actions to defend and mitigate with pre-planned processes against such attacks.

Failure to Lead, Defend and Mitigate

While the National Cyber Security Centre (NCSC) spokesperson said the organization provided guidance to affected councils and told the Local Democracy Reporting Service saying: “Whilst DDoS attacks are relatively low in sophistication and impact, they can cause disruption by preventing legitimate users from accessing online services.”

However, National Cyber Security Centre (NCSC) and its spokesperson failed to address how did such low sophistication attacks were so successful in hitting banks and a world class defense company such as BAE systems.

The Center also failed to advice or give guidelines as to how to prevent them in the future.

NOT All Gloom and Doom

On the occasion of this UK-Russia Geo-Poli-Cyber Warfare Escalation, MLi Group chairman, three times international Best-Selling Author, and geopolitical, cyber security and Geo-Poli-Cyber expert Khaled Fattal gave an exclusive interview to Survivability New where he said:

“Top corporate and national leaders and decision makers can no longer afford to shut their eyes and continue relying on what keeps failing to defend their corporate assets and structures as well as their national security and sovereignty. For years, they have been seeing with their own eyes world class cyber defense systems fail them routinely.”

Fattal then added:

“Security, that’s cyber and non-cyber, is no longer the key effective Strategy in today’s escalating Geo-Poli-Cyber Warfare and attacks threatened world – Survivability is.”  

Later, Fattal proceeded to conclude by emphasizing that top decision makers and leaders have faced an intersection for a few years which they can no longer afford to differ to make a decision on. They now must choose to continue doing what they have done for years, unchanged, and suffer the unprecedented consequences, or consider something else, by saying:

“As a leader or top decision makers, you must start seeking with a great sense of urgency to:

  1. Identify what your nation’s or business’s Geo-Poli-Cyber Warfare, Risk & Threats exposures are ASAP, and before your enemies identify them and exploit them to hit you.
  2. Learn why these exposures (Yours) are 100% ‘Unmitigated’ and prioritize which to tackle first.
  3. Discover what mitigation Strategies, plans, and processes can be implemented to address them urgently.
  4.  Otherwise, expect to become the next unprecedented victim, by failing to do A, B, and C“.

Call to Action – What Do You Do Next?

  • Request a “No Obligation” Confidential ‘Survivability’ & ‘Unmitigated Geo-Poli-Cyber™ Risks, Threats & Warfare’ Briefing: To submit your Expression of Interest (EOI), click here.
  • Partnerships & Collaborations: To submit your interest or inquiry, click here 
  • Geo-Poli-Cyber™ (GPCyber™): To learn more about GPCyber attacks, threats, risks, & Warfare, extended definition, as well as how they are significantly different from financially motivated cyber-attacks, click here.
  • Press: For press and all other inquiries, click here.

Worth Reviewing

 

 

 

The post UK-Russia Geo-Poli-Cyber™ Warfare Escalates. | Pro-Russian Hacker Group Cyber Attacks Britain’s Banks, Councils & ‘Jewel in the Crown’ BAE Systems in Retaliation to UK’s £120M aid for Drones to “Protect Ukraine Grain Corridor”. appeared first on Survivability News | Powered By MLi Group.



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?
MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ in 2012. Geo-Poli-Cyber™ hacks are political, ideological, extremist, and ‘religious’ motivated attacks. They are the hacks that cyber security, resiliency and continuity strategies and solutions continue to fail to defend governments and organizations routinely. Key are the destruction/devastation motivated new breed of Geo-Poli-Cyber hackers and lone wolfs who are often directed or backed by not only enemies but presumed allies.
2021 (C) All rights reserved. MLi Group