Cyber Threats To British Elections

British voters can expect to face an significant increase in state-backed cyber attacks, hacking  and disinformation campaigns as the country  moves towards local and national elections later in 2024. 

The first vote will be in May in local elections and a general election is expected in the second half of this year, although British Prime Minister Rishi Sunak has not yet to announced the date. 

The votes come as the country faces a range of problems including an economic issues, immigration and disagreements over events in the Middle East.  

These types of hacking attacks aren’t new. In 2016, the UK Brexit vote was found to have been disrupted by disinformation shared on social media platforms, allegedly by Russian state-affiliated groups, although Moscow denies these claims. Indeed, nation-state hackers have made numerous attacks around the world with the aim of influencing  the outcome of elections.

  • Recently the UK said that Chinese hacking group APT 31 had tried to penetrate Parliamentary email accounts, although these  were unsuccessful. Britain has since imposed sanctions on several Chinese individuals and a technology firm located in Wuhan, believed to be acting as a front for APT 31.
  • GCHQ’s National Cyber Security Centre assesses China state-affiliated actor APT31 was almost certainly responsible for targeting UK parliamentarians’ emails in 2021. Also, the US, Australia and New Zealand have applied sanctions on Chinese entities, although the Chinese government denies the allegations of state-sponsored hacking, calling them “groundless.”

Cyber security experts expect malicious actors to interfere in the forthcoming elections in several ways, not least through disinformation, which is expected to be even worse this year due to the widespread use of Artificial Intelligence (AI).

Synthetic images, videos and audio generated using computer graphics, simulation methods and AI, commonly referred to as “deepfakes”, will be a common occurrence as it becomes easier for people to create them.  The cyber security community has called for heightened awareness of this type of AI-generated misinformation, as well as international cooperation to mitigate the risk of such malicious activity.

In comment, Lewis Shields, Director, Dark Ops at ZeroFox said "For the UK specifically, local council elections are fast approaching, with a general election also on the horizon before 28th January 2025. As the world gears up for this pivotal year, a new battleground is emerging ...  With hostile state-sponsored attacks against the UK identified, and mis- and dis-information spreading more quickly and at a larger scale, the digital landscape has made preserving the integrity of election processes evermore complex... This year, threat actors will undoubtedly deploy mass-disinformation campaigns, leading to the spread of political narratives that are expected to profoundly influence the public's perception of electoral candidates".

As part of this, threat actors are expected to leverage GenAI to create more effective and persuasive content, including highly realistic synthetically-generated images and deepfakes of politicians to discredit and undermine opposition candidates.

In the past six months, more than a dozen Westminster insiders have been targeted, including politicians and government advisers. While social engineering campaigns aren’t new, the use of pressure tactics during this critical electoral year has the potential to prompt an ill-considered response. “While the cybersecurity challenges facing the 2024 elections are daunting, they’re not insurmountable. Awareness is the first step - government employees, cybersecurity experts, and the public must understand these new threats, remain vigilant, and treat everything with a high dose of scepticism. Most importantly, public sector organisations should harness a multifaceted cybersecurity approach that looks beyond the typical cybersecurity perimeter to detect and disrupt these new-age election threats that can arise across the entire internet." Shields said.

To secure its elections from cyber threats like those from APT31, the UK government is improving the overall resilience of its elections cyber infrastructure. It is working closely with the NCSC to identify threats and emerging trends. These efforts are likely to include regular security audits, penetration testing and the adoption of secure software development practices to ensure that systems are robust.

The British deputy prime minister, Oliver Dowden, has told MPs that China's attempts to interfere with UK democracy and politics have been unsuccessful, and that the government had bolstered its cyber defence since the attacks. 

“We will not hesitate to take swift and robust actions wherever the Chinese government threatens the United Kingdom’s interests... The UK judges that these actions demonstrate a clear and persistent pattern of behaviour that signals hostile intent from China.” Dowden said.

CNBC     |     National Cyber Security Centre     |     University of Portsmouth    |      University of Birmingham     |    

The Guardian     |     Euro News

Image: Ideogram

You Might Also Read: 

Deepfakes Complicate Election Security:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 


 

« Controlling The Use Of Cyber Weapons
Iranian Hackers Targeted Israel’s Radar Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Joint Accreditation System of Australia and New Zealand (JASANZ)

Joint Accreditation System of Australia and New Zealand (JASANZ)

JASANZ is the joint national accreditation body for Australia and New Zealand. The directory of members provides details of organisations offering certification services for ISO 27001.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.