A hacker group that supports Russia, calling itself NoName057(16), has claimed responsibility for a recent wave of cyberattacks on the United Kingdom. The group targeted several public websites, including those of local councils and police organisations, in a three-day attack. They used a method called a Distributed Denial-of-Service (DDoS) attack, which floods websites with traffic in an attempt to crash them.
In a series of posts on social media, the group said, “Britain is invested in the escalation of the [Ukraine] conflict, and we are disconnecting its resources.” Their goal was to disrupt British infrastructure in retaliation for the UK’s support of Ukraine.
However, the damage caused by the attacks was minor. While some websites did go offline, most services remained active or were quickly restored.
Minor Service Interruptions, Quick Recovery
Despite bold claims by the hackers, the real-world impact of their attack was limited. Local councils, including Blackburn with Darwen and Exeter, reported that their services continued without disruption. In some cases, public websites were briefly inaccessible, but they returned to normal within hours.
One of the affected websites belonged to Arun District Council. It experienced a short outage but was restored quickly. National Highways, which manages roads across England, also confirmed that it was hit by a DDoS attempt. However, the agency said its systems were not seriously affected and were operating normally soon after the attack.
The UK’s National Cyber Security Centre (NCSC) responded by saying these kinds of attacks are “low in sophistication and impact.” Still, they can cause delays in online services, especially when they hit public bodies like councils or emergency services.
The NCSC also said it had worked closely with the affected organisations and shared advice on how to reduce the risk of such attacks.
Not the First Time NoName057(16) Has Attacked
This is not the first time the pro-Russian hacker group has gone after UK websites. In October 2023, a similar campaign targeted council websites across the country. Those earlier attacks also used DDoS methods and caused minimal damage. No user data was stolen in that event either.
NoName057(16) has been active since early 2022. The group appeared soon after Russia’s full-scale invasion of Ukraine and has since made it its mission to attack Western targets that support Ukraine. It has focused on countries such as the Czech Republic, Poland, and the United States, in addition to the UK.
In early 2023, the group even tried to interfere with the Czech presidential election by attacking websites related to the candidates and the government. Again, no data was stolen, but services were briefly down.
Cybersecurity experts warn that while the group’s methods are basic, the volume and frequency of attacks make them a concern. These hackers do not usually steal data or install malware, but they aim to cause disruption and make political statements.
Wider Cyber Threat to the UK Public Sector
The latest attacks come at a time when the UK is facing a rising number of cyber threats. According to a report by cybersecurity firm Bridewell, 63% of organisations in the UK public sector were hit by ransomware attacks last year. These attacks involve hackers locking up data and demanding payment for its release.
The National Audit Office, which monitors government spending, has warned of a growing and serious cyber threat. It said public bodies need to improve their defences to keep up with how quickly hackers are evolving.
Besides NoName057(16), other hacker groups have also been active in the UK. In recent weeks, several major retailers, including Marks & Spencer, Co-op, and Harrods, were targeted in cyberattacks. In those cases, criminals tricked staff into giving away passwords by pretending to be IT support. Once they had access, they tried to break into systems and steal information.
The NCSC is investigating whether these retail attacks are linked to any state-backed groups or whether they are the work of independent criminals. So far, no connection has been confirmed.
Government Response and Future Precautions
The UK government says it is taking these threats seriously. In a statement, the Cabinet Office said that cyberattacks will not stop the UK from supporting Ukraine. It added that agencies are working together to protect critical infrastructure and improve cyber defences across all sectors.
The NCSC has urged all public and private sector bodies to follow basic cybersecurity practices. These include updating software, using strong passwords, enabling two-factor login systems, and training staff to spot phishing emails.
While the recent DDoS attacks did not cause major damage, they serve as a warning. Hackers like NoName057(16) aim to spread fear, confusion, and political messages. Their tools may be simple, but their targets are often vital to public services.
The challenge for the UK now is to stay alert and be ready for more advanced attacks in the future.