Cyber Threats To British Elections

British voters can expect to face an significant increase in state-backed cyber attacks, hacking  and disinformation campaigns as the country  moves towards local and national elections later in 2024. 

The first vote will be in May in local elections and a general election is expected in the second half of this year, although British Prime Minister Rishi Sunak has not yet to announced the date. 

The votes come as the country faces a range of problems including an economic issues, immigration and disagreements over events in the Middle East.  

These types of hacking attacks aren’t new. In 2016, the UK Brexit vote was found to have been disrupted by disinformation shared on social media platforms, allegedly by Russian state-affiliated groups, although Moscow denies these claims. Indeed, nation-state hackers have made numerous attacks around the world with the aim of influencing  the outcome of elections.

  • Recently the UK said that Chinese hacking group APT 31 had tried to penetrate Parliamentary email accounts, although these  were unsuccessful. Britain has since imposed sanctions on several Chinese individuals and a technology firm located in Wuhan, believed to be acting as a front for APT 31.
  • GCHQ’s National Cyber Security Centre assesses China state-affiliated actor APT31 was almost certainly responsible for targeting UK parliamentarians’ emails in 2021. Also, the US, Australia and New Zealand have applied sanctions on Chinese entities, although the Chinese government denies the allegations of state-sponsored hacking, calling them “groundless.”

Cyber security experts expect malicious actors to interfere in the forthcoming elections in several ways, not least through disinformation, which is expected to be even worse this year due to the widespread use of Artificial Intelligence (AI).

Synthetic images, videos and audio generated using computer graphics, simulation methods and AI, commonly referred to as “deepfakes”, will be a common occurrence as it becomes easier for people to create them.  The cyber security community has called for heightened awareness of this type of AI-generated misinformation, as well as international cooperation to mitigate the risk of such malicious activity.

In comment, Lewis Shields, Director, Dark Ops at ZeroFox said "For the UK specifically, local council elections are fast approaching, with a general election also on the horizon before 28th January 2025. As the world gears up for this pivotal year, a new battleground is emerging ...  With hostile state-sponsored attacks against the UK identified, and mis- and dis-information spreading more quickly and at a larger scale, the digital landscape has made preserving the integrity of election processes evermore complex... This year, threat actors will undoubtedly deploy mass-disinformation campaigns, leading to the spread of political narratives that are expected to profoundly influence the public's perception of electoral candidates".

As part of this, threat actors are expected to leverage GenAI to create more effective and persuasive content, including highly realistic synthetically-generated images and deepfakes of politicians to discredit and undermine opposition candidates.

In the past six months, more than a dozen Westminster insiders have been targeted, including politicians and government advisers. While social engineering campaigns aren’t new, the use of pressure tactics during this critical electoral year has the potential to prompt an ill-considered response. “While the cybersecurity challenges facing the 2024 elections are daunting, they’re not insurmountable. Awareness is the first step - government employees, cybersecurity experts, and the public must understand these new threats, remain vigilant, and treat everything with a high dose of scepticism. Most importantly, public sector organisations should harness a multifaceted cybersecurity approach that looks beyond the typical cybersecurity perimeter to detect and disrupt these new-age election threats that can arise across the entire internet." Shields said.

To secure its elections from cyber threats like those from APT31, the UK government is improving the overall resilience of its elections cyber infrastructure. It is working closely with the NCSC to identify threats and emerging trends. These efforts are likely to include regular security audits, penetration testing and the adoption of secure software development practices to ensure that systems are robust.

The British deputy prime minister, Oliver Dowden, has told MPs that China's attempts to interfere with UK democracy and politics have been unsuccessful, and that the government had bolstered its cyber defence since the attacks. 

“We will not hesitate to take swift and robust actions wherever the Chinese government threatens the United Kingdom’s interests... The UK judges that these actions demonstrate a clear and persistent pattern of behaviour that signals hostile intent from China.” Dowden said.

CNBC     |     National Cyber Security Centre     |     University of Portsmouth    |      University of Birmingham     |    

The Guardian     |     Euro News

Image: Ideogram

You Might Also Read: 

Deepfakes Complicate Election Security:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 


 

« Controlling The Use Of Cyber Weapons
Iranian Hackers Targeted Israel’s Radar Systems »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

CLUSIF

CLUSIF

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Digital Element

Digital Element

Digital Element is a global IP geolocation and intelligence leader with unrivaled expertise in leveraging IP address insights to deliver new value to companies.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Tech Data

Tech Data

Tech Data, a TD Synnex company, is a leading global distributor and solutions aggregator for the IT ecosystem.