๐ช๐ต๐ "๐๐ผ๐ ๐ฆ๐ผ๐ฝ๐ต๐ถ๐๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป" ๐ฑ๐ผ๐ฒ๐๐ป'๐ ๐บ๐ฒ๐ฎ๐ป "๐๐ผ๐ ๐ฅ๐ถ๐๐ธ" ๐ถ๐ป ๐ฎ๐ฌ๐ฎ๐ฒ
Cyber Security โข January 20, 2026 โข Written by: Gareth Jones โข Read time: 1 min
The NCSC has just issued a fresh alert regarding Russian-aligned hacktivists, and it carries a warning that caught my eye: a shifting focus toward ๐ข๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐ง๐ฒ๐ฐ๐ต๐ป๐ผ๐น๐ผ๐ด๐ (๐ข๐ง). https://lnkd.in/eSfsFHPB
For a long time, hacktivist groups like NoName057(16) were seen as a digital nuisance, primarily engaging in DDoS attacks that knocked a council website offline for an afternoon. It was frustrating, but it didn't stop the "gears" from turning.
Thatโs changing. These groups are now looking for unsecured VNC connections, the ๐ณ๐ผ๐ฟ๐ด๐ผ๐๐๐ฒ๐ป ๐ฑ๐ถ๐ด๐ถ๐๐ฎ๐น ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ windows into our water pumps, power grids, and factory floors.
The NCSCโs "Secure Connectivity Principles" (released last week https://lnkd.in/eJFuWE8H) makes it clear: we can no longer treat OT as a "disconnected" island. As we bridge the gap between IT and OT for better efficiency, weโre also bridging the gap for attackers who don't need a massive budget to cause a safety incident; they just need one exposed port.
๐๐ ๐ ๐ฒ๐๐ต๐ผ๐ฑ๐, ๐๐ฒโ๐ฟ๐ฒ ๐๐ฒ๐ฒ๐ถ๐ป๐ด ๐๐ต๐ถ๐ ๐ฐ๐ต๐ฎ๐น๐น๐ฒ๐ป๐ด๐ฒ ๐ฎ๐ฐ๐ฟ๐ผ๐๐ ๐๐ต๐ฒ ๐ฝ๐๐ฏ๐น๐ถ๐ฐ ๐๐ฒ๐ฐ๐๐ผ๐ฟ. As an NCSC-assured consultancy, we help organisations move past the "alert" stage and into active resilience. My three takeaways for anyone managing critical infrastructure right now:
๐ญ. ๐ฉ๐ถ๐๐ถ๐ฏ๐ถ๐น๐ถ๐๐ ๐ถ๐ ๐๐ต๐ฒ ๐ณ๐ถ๐ฟ๐๐ ๐ฑ๐ฒ๐ณ๐ฒ๐ป๐ฐ๐ฒ: You can't protect what you can't see. Most OT breaches start because of a "forgotten" remote access tool used by a third-party vendor.
๐ฎ. ๐๐ฟ๐ฎ๐ฐ๐ฒ๐ณ๐๐น ๐๐ฒ๐ด๐ฟ๐ฎ๐ฑ๐ฎ๐๐ถ๐ผ๐ป: We need to plan for how services stay alive when the main network is under fire. Uptime isn't just a technical metric; it's a safety requirement.
๐ฏ. ๐ง๐ต๐ฒ "๐๐๐บ๐ฎ๐ป" ๐๐ฎ๐ฐ๐๐ผ๐ฟ: These attacks are ideologically driven, not financial. They aren't looking for a payout; theyโre looking for a headline.
If youโre in the UK public sector or CNI, this isn't just another alert to file away. Itโs a prompt to audit those remote connections before someone else does.
For organisations navigating this shift, the challenge is not understanding that change is happening; it is knowing where to start, how to prioritise, and how to bring suppliers and partners along with you. This is where Methods can provide practical, outcome-driven cyber resilience consultancy - so please get in touch https://www.methods.co.uk/