The United Kingdom Government has rekindled the alarms on a persistent pattern of digital attacks that are leaving websites and essential services out of service: Russian-like hacktivist groups have been launching waves of denial of service (DDoS) against critical infrastructure and municipalities, according to a recent notice from the British National Cyber Security Centre ( NCSC).
In essence, a DDoS attack seeks to saturate the resources of a service - bandwidth, memory, processes - until it stops responding. No sophisticated technical arsenal is necessary to cause great damage; simple but persistent attacks force teams to invest time and money in forensic analysis, containment and restoration, and to degrade public confidence in services that depend on continuous availability.

The NCSC points to a particular actor who has gained notoriety in this scenario: NoName057 (16). This collective, identified as pro-Russian and active since 2022, has promoted the platform known as DDoSia, which allows sympathizers to provide computation power to launch coordinated attacks and, in return, obtain recognition or small internal rewards. Although international authorities achieved an intervention against the group's infrastructure - an operation that included arrests, arrest warrants and the fall of many servers - the activity was again redirected when the main operators were out of reach of justice, according to the NCSC's own bulletin.
It should be stressed that NoName057 (16) is perceived more as a political actor than as a profit-oriented criminal organization. Their motivation is ideological. and that is a particular challenge: the attackers do not necessarily seek immediate economic benefit, so their campaigns can be unpredictable and persistent. In addition, the NCSC warns that the risk is no longer limited to public websites and portals; the operational technology (OT) environments, which control industrial processes and essential services, are also beginning to be affected, which increases the potential impact on physical security and operational continuity - for those who manage OT, the NCSC has collected specific recommendations that can be consulted. Here..
Against this background, the practical question is: what can organizations do to avoid being easy victims? The answer is not a silver bullet, but it is a set of reasonable and applicable measures. First, it is appropriate to map clearly which services are critical and where are the bottlenecks that an attacker could exploit to exhaust resources. It is also essential to work with suppliers: mitigation at the network operator level, specialized DDoS protection solutions and the use of content distribution networks (CDN) can absorb much of the malicious traffic before it reaches the target service. Complementary, design architectures that allow fast climbing - for example, using cloud self-climbing capabilities or virtual machines reserved - helps to maintain the operativity when the legitimate demand is mixed with the traffic of an attack.
Organizational preparation is equally crucial. Having profiled, practiced and designed response plans to degrade services in a controlled manner allows prioritizing essential functions and maintaining administrative access during the crisis. Test those responses and monitor continuously are practices that allow to detect emerging campaigns and to check that the defenses really work when it is most needed. To understand the technical problem and defence strategies in more detail, industry resources such as the infrastructure provider DDoS guide provide practical explanations and mitigation tools - for example, the Cloudflare series on what a DDoS is and how to counter it is useful for technical equipment ( Cloudflare) -.

It is also important to frame these incidents in a broader geopolitical dimension. Since 2022, there has been an increase in the campaigns of Moscow-like actors directed against public institutions and companies in countries that criticize Russian policies. This political component explains why some groups prioritize the impact on economic benefit and why their actions can persist even if their infrastructure is partially dismantled by law enforcement. At European level, agencies such as the European Union Agency for Cybersecurity (ENISA) have published analyses and recommendations that help to contextualize threats and prepare pan-European defences ( ENISA).
The main lesson for local governments, critical service operators and companies is twofold: on the one hand, technical prevention and collaboration with suppliers and law enforcement agencies reduce the area of attack; on the other, operational resilience - implemented plans, redundancies and scaling capacity - determines the speed with which an organization recovers. In a world where political protest can be moved to the network very easily, this capacity to respond is, in many cases, the best defence.
If you manage services that could be objective, it is worth starting by reviewing the official guides and reference materials: the NCSC's notice of these campaigns ( NCSC), the collection of good practices for the center's own OT environments ( OT guide) and the technical resources of European suppliers and agencies explaining specific mitigation and response scenarios ( Cloudflare, ENISA). Cybersecurity is no longer just a matter of specialists: the availability and proper functioning of digital services affect citizens and businesses, and therefore the preparation must be cross-cutting and continuous.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...