You are on page 1of 74

ways in which AI

positive will Cover


the e , s ecuring an open hel
p generated
g ap and t
owin ndsc res o nu using AI
sh ity la ili e rtu
e r nt d re
ag ecu ig o
im r s ita ur
ls
be
n

ec ety
in t: A
cy

oc

os
p

ys
a
om

te
pr

Annual
Review
2023
Making the UK the safest place to live and work online
A note on our front cover, produced
with artificial intelligence (AI)
The front cover of this year’s Annual Generative AI tools pose ethical, legal,
Review, along with the illustrations and existential questions which society
included within, were created using an is grappling with, and will continue to
image generator, powered by artificial grapple with, for years to come. While AI
intelligence (AI). Working closely with a as an emerging technology presents a
design agency, we wanted to explore the huge opportunity for global governments
opportunities that AI presents as well as and wider society, in the context of
its limitations. increasing interest and intrigue from
This effort has been an iterative one, the UK public, it’s vital that those using
as initial prompts used included ‘cyber these technologies understand the cyber
security’, ‘future’ and ‘technology’. security risks, as our CEO Lindy Cameron
These prompts alone generated the warned earlier this year.
stylised green coding, dark quasi- It is incumbent on us all to use AI
dystopian images and men in hoodies responsibly and for us at the NCSC,
hunched over laptops which we have working with industry and governments
become accustomed to, reinforcing around the world to ensure that cyber
a stereotypical representation of security is thoroughly considered during
cyber security. the development of new AI technologies.
When asked to show people within these

About the NCSC


images, biases were common, too.
When we amended the prompts to
incorporate ‘inclusion’, ‘open and resilient
society’ and ‘diversity’, the images began The National Cyber Security Centre
to change – and with our design agency, (NCSC), a part of GCHQ, is the UK’s
we created a front cover which better technical authority for cyber security.
aligns to the kind of future the NCSC aims Since 2016, it has worked to make the
to shape for the whole of society. UK the safest place to live and work
online, and bring clarity and insight to
These tools will have their uses but what
an increasingly complex online world.
this exploration reinforces is that an
This review of its seventh year reflects
inclusive, diverse, and open future of
highlights and milestones between
cyber security requires our collective
1 September 2022 and 31 August 2023.
intent – it will not happen organically,
It also looks ahead to future challenges.
without effort.
As part of a national security agency,
not all its work can be disclosed publicly
but the review seeks to describe the year
with insights and facts from colleagues
inside and out of the organisation.
NCSC Annual Review 2023

Contents
2 39
Timeline Case study: Defending our
democracy in a new digital age
– at the ballot box and beyond
4
Ministerial foreword
43
Case study: The next generation
6 of UK cyber security services
Director GCHQ

47
8 Chapter 3 – Ecosystem
CEO NCSC

55
10 Chapter 4 – Technology
Chapter 1 – Threats and Risks

64
17 Case study: The cyber security
of artificial intelligence
Case study: Russia – an acute
and chronic cyber threat

71
22 Afterword
Chapter 2 – Resilience

33
Case study: Securing the UK’s
critical national infrastructure

1
NCSC Annual Review 2023

Timeline
2022 6 February
13 national teams claimed victory at the
7 September
2023 CyberFirst Girls Competition finals
Lindy Cameron discusses international
collaboration in deterring malign actors 27 February
with industry, at the 13th Billington Cyber Lindy Cameron speaks about the
Security Summit in Washington importance of good cyber hygiene
among the public sector at Cyber Security
8 September
Scotland
The NCSC mourns the death of Her Majesty
the Queen whom we will always fondly 14 March
remember for officially opening our doors The NCSC publishes thought leadership
in February 2017 piece on the security of large language
models, following the rise in popularity of
20 September
ChatGPT
The UK and our allies expose Iran’s Islamic
Revolutionary Guard Corps for exploiting 21 March
cyber vulnerabilities for ransomware The NCSC urges organisations to utilise its
operations Cyber Action Plan and Check Your Cyber
Security services as part of its Cyber Aware
12 October
campaign
The NCSC issues fresh guidance following
recent rise in supply chain cyber attacks 11 April
Anne Keast-Butler announced to succeed
14 November
Sir Jeremy Fleming as the Director of
Cyber Aware campaign launched to help Government Communications Head
keep online shoppers more secure in the Quarters (GCHQ)
run up to Christmas
13 April
9 December
The NCSC and international partners
The NCSC and DCMS publish code of share new advice to encourage software
practice for app store operators and app manufacturers to embed secure-by-
developers design and secure-by-default principles
into their products
2023
17 April
11 January
The NCSC’s Cyber Advisor launches
The NCSC provides support to Royal Mail
to support small and medium-sized
following a cyber attack
businesses without in-house cyber
19 January expertise
The NCSC hosts members of the national 19 – 20 April
Computer Emergency Response Team for
Ukraine (CERT-UA) to discuss Russia’s illegal
invasion and building cyber resilience The UK’s flagship cyber security conference
CYBERUK is held in Belfast for the first time
3 February
Lindy Cameron visits India for a series of 19 April
meetings with cyber security leaders on the New NCSC report assesses the threat to
shared opportunities and challenges the UK industry and society from the use of
UK and India face in cyberspace commercial cyber tools and services

2
NCSC Annual Review 2023

19 April 6 July
The NCSC issues warning of emerging The NCSC’s sixth annual Active Cyber
threat to critical national infrastructure Defence (ACD) report highlights success in
from a new class of state-aligned cyber preventing millions of cyber attacks from
adversary reaching the UK

20 April 23 July
UK and international partners publish joint New shadow IT guidance published to help
guidance to help communities create organisations manage rogue devices and
secure smart cities services within the enterprise

9 May 3 August
UK and international allies issue joint The NCSC and allies reveal most common
advisory exposing Snake malware and its cyber vulnerabilities exploited in 2022 in
use in operations carried out by Centre 16 new advisory
of Russia’s Federal Security Service (FSB)
24 August
13 May The NCSC launches the research problem
The NCSC provides support to the book, laying out the areas of cyber security
Eurovision Song Contest to improve cyber that need cooperative research over the
security resilience next 5-10 years

24 May 31 August
UK and its allies issue new warning about UK and allies support Ukraine calling out
China state-sponsored cyber activity Russia’s GRU for new Infamous Chisel
targeting critical national infrastructure malware campaign
networks

7 June
The NCSC works with UK organisations to
respond to the MOVEit vulnerability and
data extortion incident and publishes
guidance

14 June
UK and international partners issue a new
joint advisory warning of the enduring
threat posed by the LockBit ransomware
operation

14 June
Lindy Cameron emphasises the
importance of building security into AI
technologies in a major speech at the
Chatham House Cyber 2023 conference

30 June
The NCSC marks 20th anniversary of first
response to state-sponsored cyber attack

3
NCSC Annual Review 2023

Ministerial foreword
We live in a dangerous, volatile The Government treats cyber security
with the same urgency and importance
world. The events of the last year
as we treat our traditional defences. The
have demonstrated the extent National Cyber Security Centre is on
to which geopolitical crises and that frontline, building and maintaining
technological change impact our resilience in the face of a rapidly
expanding array of threats. Indeed, this
us all, threatening not just our
year’s Annual Review demonstrates
traditional security but our how the NCSC continues to lead the
economic security. way, producing expert analysis of new
technologies and emerging risks and
The new front line is online. As this Annual opportunities. This technical expertise
Review shows, the methods of attack are underpins our collective efforts to tackle
proliferating. The number of hostile state threats from malicious cyber actors, and
and non-state actors with access to such demonstrates the NCSC’s world-class
tools is growing. The ways in which these advisory function.
countries, organisations and individuals
can do us harm – from bots undermining Given the pace of change, it is vital that
our democracy, to hacks disrupting our we get ahead of these fast-developing
public services, to ransomware attacking technologies to ensure the right
our businesses – is expanding. The rapid mitigations are in place before the risks
rise of artificial intelligence is accelerating emerge. That is why the UK hosted the
the pace of change, compounding the first ever AI Safety Summit in Bletchley
threats and lowering the barrier to entry. Park in November 2023. Through that
As a result, the cyber world is a more summit we started to spearhead a
dangerous place than ever before, and new form of multilateralism, one that
cyber security is rising up our risk register. brings together countries, companies,
academics and other experts in the field.
Because it is only by working together
that we will make AI safe for everyone.

4
That same approach is needed towards
cybersecurity more broadly. We need
a whole-of-society approach, where
Government and industry work in
partnership - to defend as one - to make
us all more resilient as a nation. And those
who can must work to shift the burden
away from end users and increase
protections for all of us, as we increasingly
live our lives and do our work in the virtual
world. As I said to CYBERUK in Belfast in
April, I urge businesses to look again at
their security and strengthen it where
they can. In turn the government will do
its bit, including through the National
Protective Security Authority.
This next year will come with new
challenges. But by working together in
partnership, underpinned by our values
and alliances, and by building on the
vital work of the NCSC to make the UK the
safest place to live and work online, we
will be ready for them.

The Rt Hon Oliver Dowden CBE MP


Deputy Prime Minister and Chancellor of
the Duchy of Lancaster, and Secretary of
State in the Cabinet Office
NCSC Annual Review 2023

Director GCHQ
Since my appointment as cyber security risks. The NCSC has
been championing the case for taking
Director GCHQ earlier this year I
a ‘secure by design’ approach to AI, by
have been hugely impressed by building cyber security into technology
the efforts of our cyber security solutions from the outset. Another vital
experts at the NCSC. The sheer consideration is to ensure diversity and
ethics are built into every stage of AI’s
breadth of our work is neatly
development. Potential limitations and
captured in this review’s timeline biases are cleverly demonstrated by the
of activities over the past 12 NCSC’s use of AI to create images for this
months. Joining international review.
partners in calling out the We can trace the roots of AI to GCHQ’s
activities of malicious actors, beginnings in Bletchley Park, where the
government’s 2023 AI Safety Summit took
producing timely guidance to
place. In Bletchley, as in GCHQ today,
help organisations stay secure our brilliant people, technology and
and delivering an outstanding tradecraft have always invented and
CYBERUK conference in Belfast mastered new technology to make sense
are just a few of the ways the of data and protect the UK from harm.

NCSC has been working to keep In an unpredictable world where


technology evolves at ever greater
us all secure online.
speed, the NCSC has always adapted to
The context in which the NCSC operates opportunities and challenges. I have no
continues to be challenging. Cyber doubt that with our range of technical
security remains a priority as part of expertise and collaborative spirit the
GCHQ’s overall support to Ukraine in organisation will continue to do so.
the face of Russia’s illegal invasion, as
does the NCSC’s response to new and
Anne Keast‑Butler
emerging threats, including that to
critical national infrastructure (CNI) from Director of GCHQ
state‑aligned actors.
The recent acceleration of progress – and
media attention in – the field of artificial
intelligence (AI) cannot have escaped
anyone’s attention, and this of course
has major cyber security implications.
AI has the potential to improve cyber
security by dramatically increasing
the timeliness and accuracy of threat
detection and response, and while AI
offers fantastic opportunities, all sectors
need to be clear‑eyed about the related

6
NCSC Annual Review 2023

CEO NCSC
I am very proud to present To make sure that the NCSC continues to
focus our work where it is most needed,
the seventh Annual Review of and to deliver against the objectives
the National Cyber Security in the government’s National Cyber
Centre, a part of GCHQ. Today, Strategy, we will focus on three priorities
seven years on, our mission over the coming year.
remains to make the UK the First, we must improve the UK’s cyber
safest place to live and resilience to the most significant cyber
risks. We will continue to improve our
work online. understanding of the threats we face
We must continue to adapt to meet and use this knowledge to strengthen
ever-evolving cyber security challenges. resilience in the areas that carry the
Whether these come in the form of most risk for the UK, be that across
rapid development of technologies government or to the companies
such as Artificial Intelligence (AI) or state involved in delivering our critical national
adversaries seeking to gain advantage infrastructure. We have learned a lot
over us, we must ensure that the UK, about our resilience in light of the
as a responsible cyber actor, stays ongoing war between Russia and Ukraine,
(at least) one step ahead. which remains the most sustained and
intensive cyber campaign ever. But as the
In this year’s Annual Review, we reflect threat landscape evolves, we will need
on key developments, achievements to measure the impact we can have on
and trends from the last year. We’ve also resilience, as well as work with others to
included five areas of specific interest to maximise our success.
the cyber security community – setting
out the NCSC’s thinking on AI cyber Secondly, we must retain our edge.
security, on securing the UK’s Critical Technology is developing faster than ever,
National Infrastructure, on defending and, in an increasingly unpredictable world,
our democratic processes, the future our adversaries are seeking to use this
of UK cyber security services (including change for their own advantage. We must
the NCSC’s role in their provision), and ensure the UK retains its edge in the face of
reflecting back on what we have learned future cyber security challenges, including
from Russia’s further invasion of Ukraine. those emanating from China, which we
know poses an epoch-defining challenge
in the years to come, as well as those
posed by future technology shifts. We will
need to ensure that the technology we
deploy throughout our economy is secure
by design, and that we have the
technological capabilities and
partnerships for the future to enable us to
counter these threats as they evolve.

8
NCSC Annual Review 2023

And finally, the NCSC will only be


successful in its mission if we are the
strongest organisation we can be.
We must continue to evolve as the UK’s
national technical authority on cyber
security, deepening our expertise and
continuing to increase the diversity of
our workforce. We will continue to listen
to and learn from external specialists,
ensure our services work for those who
use them and engage in public debates
about the implications of evolving
technology for our democratic values.

Lindy Cameron
CEO of the National Cyber Security Centre

9
Chapter 1
> Threats and Risks
NCSC Annual Review 2023

The global threat landscape is In May, the NCSC and international


partner agencies issued a joint
ever-changing, so it has never
advisory highlighting how recent China
been more important for the state‑sponsored activity had targeted
NCSC, as the UK’s technical critical infrastructure networks in the
cyber security authority to US and could be applied worldwide.
continue to identify, monitor And in October, MI5 Director General
Ken McCallum warned about the state
and analyse key cyber security threat to cutting‑edge start-ups working
threats, risks, and vulnerabilities. on UK research and innovation.
The NCSC enables and supports The challenge is global and systemic,
wider government and society and close collaboration with allies
to anticipate and respond to new and industry will be crucial in further
and recurring challenges. developing our understanding of the
cyber capabilities threatening the UK.
This year has seen the emergence of
Russia
state-aligned actors as a new cyber
threat to critical national infrastructure Since Russia’s further invasion of
(CNI), the continuation of Russia’s illegal Ukraine in February 2022, the NCSC
invasion of Ukraine, and the concerns has helped Ukraine to develop its
around the potential risks from AI – cyber resilience. We continue to see
all of which drive the need for NCSC further cyber activity targeting Ukraine
interventions and support. by Russia and Russia‑aligned actors.
Beginning in 2022, this included a wave
The key threats the NCSC continues to of distributed‑denial-of-service (DDoS)
track and respond to include: and data wiper attacks against Ukrainian
China government and industry. However,
the impact on Ukraine has been less than
The rise of China as a technology
expected, in part due to well-developed
super‑power poses an epoch-defining
Ukrainian cyber security and support
challenge for UK security and, as NCSC
from industry and international partners,
CEO Lindy Cameron highlighted in her
including the UK’s own cyber programme.
speech at this year’s CYBERUK, we risk
China becoming the predominant Iran
power in cyberspace if our efforts to raise In January, the NCSC issued an advisory
resilience and develop our capabilities highlighting spear-phishing activity
do not keep pace. against targeted individuals in sectors
With our partners, we continue to see of interest to Iran, including academia,
evidence of China state-affiliated cyber defence, government organisations, NGOs,
actors deploying sophisticated capability think tanks, as well as politicians, journalists
to pursue strategic objectives which and activists.1 In July, the UK government
threaten the security and stability of highlighted the rising threat from Iran
UK interests. including increased efforts to kill or kidnap
individuals perceived to be enemies of the

1 https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest

11
NCSC Annual Review 2023

regime outside of Iran, including in the UK. 2 funds via cyber thefts is widely reported,
Iran remains an aggressive and capable and cyber attacks against a variety of
cyber actor and will almost certainly institutions, companies, and government
use cyber for its objectives. The NCSC organisations in search of information
continues to work closely with government and credentials is also prolific.
and industry partners to understand and
Ransomware
mitigate the cyber threat from Iran.
Ransomware remains one of the most
Democratic People’s Republic of Korea acute cyber threats facing the UK,
(DPRK) and all domestic organisations should
Cyber is one of the means through take action to protect themselves from
which the DPRK aims to improve their this pervasive threat. The now-normal
poor economic situation through illicit approach of stealing and encrypting
revenue generation and sanctions data continues to be the primary tactic
evasion, to further consolidate the cyber criminals use to maximise profits.
current regime, and to strengthen and However, data extortion attacks, in which
maintain its ability to defend itself data is stolen but not encrypted are a
against perceived hostile actors. Raising growing trend in the threat landscape.

Between September 2022 and August


2023, we received 297 reports of
ransomware activity (‘tips’), triaged
into 28 NCSC-managed incidents, 18 of
which were categorised as C3 and
above. The top five sectors reporting
into the NCSC were academia (50),
manufacturing (28), IT (22), finance
(19) and engineering (18). Although
academia appears high in our
statistics, we do not have any specific
evidence of actual targeting of
this sector.

2 https://www.gov.uk/government/news/uk-steps-up-action-to-tackle-rising-threat-posed-by‑iran

12
NCSC Annual Review 2023

Cyber proliferation defacements and/or the spread of


Commercial proliferation will almost misinformation, some have stated a
certainly be transformational to the cyber desire to achieve a more disruptive and
threat landscape. Commercial cyber destructive impact against western CNI,
tools and services lower the barrier to including in the UK. The NCSC continues
entry to both state and non-state actors, to prioritise the resilience of UK CNI.
enabling them to access cost-effective AI / Large language models
capability and intelligence they would Our adversaries – hostile states and
not otherwise be able to acquire. This cyber criminals – will seek to exploit
creates an opportunity for misuse in the AI technology to enhance existing
absence of oversight or an understanding tradecraft. In the short term, AI technology
of how international norms apply. The is more likely to amplify existing cyber
NCSC continues to support government threats than create wholly new ones but it
with the UK’s international response will almost certainly sharply increase the
working with like-minded countries, speed and scale of some attacks. There
to ensure advanced commercial is now a significant amount of activity
cyber capabilities are developed, across the NCSC and wider government
sold, and applied in a way that is legal, to assess and respond to the potential
responsible, and proportionate as part threats and risk posed by AI.
of the UK government’s ambition to instil
responsible behaviours in cyberspace. Incident management
Within the NCSC, the Incident
Cyber-enabled fraud
Management (IM) team deals with all
Fraud continues to be one of the most the cyber attacks that are reported to
significant threats facing UK businesses us, focusing in particular on incidents of
and citizens. In 2021 more than 80% o f all national significance for the UK.
reported UK fraud was cyber-enabled, but
only 32% o f UK citizens thought they were This year we saw a jump in reports of
likely to become a victim. Over the past cyber attacks coming into the NCSC,
year, the UK government’s Cyber Aware but the volumes that reached the
campaign supported individuals and threshold of national significance
small businesses to significantly improve remained broadly stable. There were,
their personal cyber resilience with two however, more incidents at the top end of
simple steps: the scale, reflecting more high-level and
damaging incidents against the UK.
• use a password based on three
random words We received 2,005 reports, an increase
of almost 64% from last year’s 1,226.
• secure accounts by enabling two-step 371 were deemed serious enough to
verification (2SV) be handled by the IM team (compared
Critical national infrastructure (CNI) with 355 last year). Of these, 62 were
nationally significant (63 last year) and
2023 has seen the addition of
four of them were among the most severe
state‑aligned actors to the ongoing
incidents the NCSC has had to manage
threat from state actors, as a new and
(compared with one last year) due to the
emerging cyber threat to CNI. While
sustained disruption they caused and the
the cyber activity of these groups
victims’ links to critical infrastructure via
often focuses on DDoS attacks, website
supply chains.

13
NCSC Annual Review 2023

The NCSC issued 24.48 million The highest proportion of incidents


notifications, informing subscribing handled by the NCSC resulted from the
organisations of potential malicious exploitation of applications. This involves
activity detected on their networks, or an actor exploiting a vulnerability in
exposure to a vulnerability, through a public-facing application to gain
our automated Early Warning service. unauthorised access to a target
Of these, 258 notifications were network. Incidents resulting from these
considered serious enough for a bespoke vulnerabilities can be some of the most
service from the IM team. widespread, for example in the Citrix
The NCSC was made aware of 327 reports vulnerability (CVE‑2023‑3519) the NCSC
that involved the exfiltration/extortion of was required to deal with 13 separate
data, which is an increase on last year nationally significant incidents involving
and is indicative of the value that both the exploitation of this vulnerability. To aid
cyber criminals and nation state actors the prevention of incidents such as this,
find in data. All types of data can be caused by poor cyber hygiene, the NCSC
manipulated by these actors, meaning sent over 16,000 notifications of vulnerable
unsuspecting organisations could be services via our Early Warning Service.
considered targets.

Incident management

• This year we received an all-time high of


2,005 reports*, an increase of almost 64% from
last year’s 1226.
• The NCSC issued 24.48 million notifications,
informing organisations that they were
experiencing a cyber incident, through our
tips
automated Early Warning service.
• 327 incidents involving the exfiltration/extortion incidents
of data (18.5% i ncrease on last year).
*Increase in reports attributed to change in data
collection and cannot be compared directly to
previous years.

14
prompt:
An image / illustration identifying and
analysing cyber security threats to
individuals and organisations and
making sure systems are secure to
stay one step ahead of adversaries
and cyber criminals.

commentary:
We wanted to show how cyber
attacks are a critical threat to our
national security and everyday lives
and how the NCSC is leading the UK’s
defence by supporting government,
critical national infrastructure and
citizens to help to reduce the harm
from cyber security incidents.
NCSC Annual Review 2023

Case study: Russia – an acute and


chronic cyber threat
In cyberspace, Russia continues to be one Attacks in the latest stages of the conflict
of the world’s most prolific cyber actors. now seem opportunistic rather than
It dedicates significant resources towards strategic. But why haven’t we seen
conducting cyber operations around more destructive activity from Russian
the globe and poses a significant and cyber actors?
enduring threat to the UK. But what have This could be due to a number of factors:
we learnt from Russia’s cyber operations the presence of state-aligned actors
in Ukraine so far, and how might the value contributing to a ‘chaotic’ landscape;
of cyber operations or use of capabilities Russia not having enough coordination
differ depending on context to achieve between different military actors; Russia
their strategic objectives? taking a more cautious approach as
Russian cyber activity against Ukraine to when to ‘burn’ its best capabilities;
On 24 February 2022, a cyber Russian actors relying on some elements
attack against Viasat, a US satellite of Ukrainian infrastructure themselves;
communications company, began and, fundamentally, the incredible resolve
approximately one hour before Russia of Ukrainian cyber defences in rapidly
launched its further invasion of Ukraine. responding to cyber attacks, and bringing
It was an attempt to cripple Ukrainian themselves back online.
military operations and communications Whatever the case, it is clear cyber
which spilled over into Europe affecting defenders have more of a say in what
both organisations and citizens. happens in this conflict than some of
This was followed by destructive and the rhetoric on Russia’s offensive cyber
disruptive cyber attacks on Ukrainian CNI, capabilities suggests.
telecoms providers, government entities Russian information advantage
and an attempted attack on power grids. In this conflict, much of the battle has
There has been a significant amount of been in the information space, with
wiper activity and these attacks have Russian actors waging operations to gain
often accompanied military operations. intelligence on adversaries, to contest
The integration of Russian cyber the very information about the war itself
operations into its wider military campaign and the nature of the conflict, shaping the
objectives has had an effect, but not on information space to its advantage.
the scale many were expecting. And, while Russian cyber actors remain
Since at least Russia’s illegal annexation an acute threat, causing high-profile
of Crimea in 2014, Ukraine has worked incidents, the impact is becoming more
tirelessly to build its cyber resilience and chronic as the targeting shifts to reflect
with western support, their defences Russia’s new geopolitical reality.
have stood up robustly to Russia’s initial
onslaught.

17
NCSC Annual Review 2023

Cyber espionage continues to be used The point here is to not assume you are
as an important tactical weapon, not important enough for Russian spies
strategically and operationally, in to take an interest, if it furthers their aims
supporting Russian political and and objectives.
economic objectives in Ukraine and An initial interaction with an individual or
around the world. organisation (in the form of an unsolicited
Since Russia’s further invasion of Ukraine, approach on LinkedIn or an email with a
their cyber operations have expanded malicious link) is all it could take to allow
to include anything or anyone with a hostile actors into your networks and
connection to Ukraine which seeks to find the information they want to use for
gain an information advantage on the their advantage.
battlefield and geopolitically. The risk of supply chain compromise
This has obviously included traditional also continues to loom large. In 2021,
military and government targets, we and our US partners attributed the
although cyber has provided Russia unauthorised access of SolarWinds Orion
with new means to achieve their software and subsequent targeting to
objectives. In August, along with the Russia’s Foreign Intelligence Service (SVR).
Security Service of Ukraine and Five These incidents are part of a wider
Eyes partners, we publicly revealed that pattern of cyber intrusions by the SVR who
Russian military intelligence service have previously attempted to gain access
(GRU) capabilities are targeting Ukrainian to governments across Europe and NATO
battlefield information, in this case from
members and who continue to exploit
Android devices. vulnerabilities to this day.
However, the reach of Russia’s cyber A chain is only as strong as its
operations has also stretched to weakest link.
academics, think tanks, logistics
and transport hubs, manufacturing Russian patriotic hackers
companies, supply chains, charities Over the past 18 months we have seen
and unassuming Internet of Things a new class of Russian cyber adversary
(IoT) devices. emerge. State-aligned actors (the
For example, as stated publicly by Rob favoured language used by the UK
Joyce, Director of Cybersecurity at the government to describe these groups)
NSA, Russia has targeted IoT surveillance are often sympathetic to Russia’s further
cameras to aid their warfighting efforts, invasion and are ideologically, rather than
and routinely target the transport sector. financially, motivated.
Microsoft warned in December 2022 of They have been emboldened to act with
Russia potentially targeting countries that impunity regardless of whether or not
provide vital supply chains of weaponry they have Russia’s backing.
and humanitarian aid.

18
NCSC Annual Review 2023

Our Canadian allies wrote publicly Russian speaking ransomware:


about the emergence of the groups and organised crime gangs (OCGs)
highlighted how Russia has sought to Russian language criminals operating
project power by deploying destructive Ransomware and ‘Ransomware as a
cyber attacks against the strategic CNI Service’ (RaaS) continue to be responsible
targets of their adversaries as geopolitical for the most high-profile cyber attacks
crises escalate. This includes aspirations against the UK. Several of these groups
to sabotage the operational technology are known to have varying links with the
(OT) utilised across CNI. We share their Russian state and many of their activities
concerns; some non-state groups are tolerated.
probably have a higher risk appetite than
Sanctions, indictments, and rewards
state groups we have tracked for years.
levied on the likes of EvilCorp and the
Some such groups may seek to tamper group behind Conti has seen them
with any vulnerable CNI networks they draw on the wider ecosystem to
can access, without being able to distance themselves from the larger
understand or control the impact of OCG branding.
their actions.
The ransomware model continues to
These state-aligned actors might evolve, with a well-developed business
seemingly offer the Russian state model, facilitating the proliferation of
‘plausible deniability’ in its attacks, capabilities through RaaS. This is lowering
but that is where attributions by the UK the barriers to entry and smaller criminal
government and our allies, together groups are adopting ransomware and
with technical advisories by the NCSC extortion tactics which are making a
are critical in unmasking the Russian huge impact.
state’s intent and holding such actors
It is possible that Russia, or indeed
to account.
any state, could purchase access to
These groups create a new set of supportive companies and low equity/
unintended consequences, operating disposable capabilities to enact attacks,
without constraints in a conflict – including destructive attacks through
including unpredictable behaviour, ransomware. This would help them
heightening the risk of miscalculation. distance themselves from attribution and
They also ask profound questions to enable them to scale without having to
about who gets to operate in cyberspace garner accesses themselves.
and how.

19
NCSC Annual Review 2023

However, most ransomware incidents In the ‘Defending Democracy’ paper later


are not due to sophisticated attack in this report, we explore this theme in
techniques. Success for the criminals greater depth and identify the threats
is usually due to the result of poor and security challenges our democracy
cyber hygiene. Organisations are faces online and how a collective
often not following NCSC advice and effort across the whole of society and
there are still very large volumes of in partnership with allies is required
victims. In fact, ransomware attacks are to ensure our democratic institutions,
rising. If organisations are not taking traditions and values are well-prepared
the correct protective measures the for this new phase in digital development.
threat will continue unabated as threat
What can cyber defenders do about it?
actors seek to exploit opportunities and
maximise profits. We may not necessarily be able to
anticipate specific cyber attacks from
Russian attempts to manipulate Russia but we do prepare for all outcomes
democratic institutions by investing in the UK’s cyber resilience.
It is no secret that Russia seeks to And while NCSC services like Cyber
weaken and divide their adversaries Essentials are not intended to prevent
by interfering in elections using mis attacks from sophisticated adversaries,
and dis-information, cyber attacks, the controls outlined are a good
and other methods. foundation on which to build and make
The UK government assesses that it them work a little harder.
is almost certain that Russian actors Russia’s cyber activity may seem erratic,
sought to interfere in the 2019 general but it is targeted and dependent on its
election. In the coming months, with UK goals and motivations. They act in their
and US elections on the horizon we can own interests, and they are challenging
expect to see the integrity of our systems our notion of what we consider to be
tested again. critical and how we prioritise resilience
Protecting our democratic and electoral across society.
processes against foreign interference, Regardless of the threat, where it is
whether from Russia or any other state, coming from, and which methods are
is and always will be an absolute priority used, put simply we need to implement
for the NCSC and we will continue to better cyber hygiene. We have the
support the government’s critical work information and tools at our disposal to
in this area. defend ourselves. We just need to use
them better.

20
Chapter 2
> Resilience
NCSC Annual Review 2023

The NCSC continues to support make up the groups; the thousands of


smaller organisations that sit within their
government, public and
supply chains; those citizens that are their
private sector critical national customer base. This approach ensures
infrastructure (CNI), citizens, engagement and nuance, allowing
and organisations of all sizes businesses, large and small, to access
guidance and information, while also
across England, Wales, Scotland
participating in a supportive community.
and Northern Ireland to raise
awareness of cyber threats and Share and defend
improve resilience for the whole When it comes to raising the resilience
of citizens and small organisations, our
of society. programmes of work focus on securing
Cyber resilience is essential to the UK’s citizens and small organisations online at
economic and national security interests. scale, reducing the burden on them to act.
The NCSC’s services and interventions Our Takedown Service in this programme
are working to enhance the UK’s ability to is approaching 10 million takedown
prepare, respond, recover, and learn from records for malicious infrastructure. By
cyber attacks to make the UK the safest taking down malicious domains quickly,
place to live and work online. it reduces the number of people who fall
victim to scams. To further strengthen
August 2023 marked 18 months since the those protections, the NCSC is building
publication of the National Cyber Strategy the Share and Defend capability. This
2022, and it remains at the heart of the capability will enable the sharing of
government’s comprehensive plan to government and industry data around
keep our country safe online and grow our malicious domains, at scale and in near
cyber industry. As outlined by the Deputy real time, enabling the protection of
Prime Minister Oliver Dowden, “since its citizens and small organisations upstream
publication, we have become more secure by their service providers. We are currently
against cyber attacks, and we have taken sharing data tactically with several major
decisive action against our adversaries”. UK ISPs, whilst working collaboratively with
Central to these efforts are a whole of industry to develop the capability, identify
society approach, bringing together relevant datasets and place protections
private and the public sectors, “defending where they will have the most impact
as one so we can prosper as one”. This is for users.
in line with the government’s approach to
Cyber Essentials
resilience as set out in the government’s
Resilience Framework. Appetite for the NCSC’s Cyber Ess entials
scheme continues to grow. The number
Trust groups of Cyber Essentials certificates awarded
Central to our whole of society approach, in the past year has increased by 21% to
the NCSC has ensured long-lasting and 28,399 overall; while the total number of
meaningful impact by building trust Cyber Essentials Plus certificates awarded
groups, industry-specific communities of was 9,037 – a n increase of 55% . In total
Chief Information Security Officers (CISOs) 141,712 Cyber Essentials certificates have
in businesses and organisations. This is been awarded since the scheme began.
now an established model that sees us The scheme is proving its efficacy too,
work in collaboration with the trust groups with data suggesting that 80% fewer cyber
on raising the cyber resilience in their insurance claims are made when Cyber
23
sectors for: those larger organisations that Essentials is in place.
NCSC Annual Review 2023

Cyber Essentials

+
28,399 9,037 321 80%
certificates Cyber Certification fewer insurance
awarded Essentials Bodies right claims with Cyber
(21%) Plus across the UK Essentials in place
certificates (6%) (Insurers’ data)
awarded
(55%)

By business size
Cyber Essentials certificates Cyber Essentials Plus certificates
Micro 35% 36%
Small 34% 28%
Medium 20% 21%
Large 11% 15%

Top 3 reasons given for certification


other

To generally
improve security
35% 28%

Required for
government contract
15%
22%
Required for
commercial contract

• The estimated fail rate for Cyber • This year saw an increase in the
Essentials across all organisation sizes proportion of Cyber Essentials
has dropped from 3.4% to 2.45% . (increase of 4%) and Cyber Essentials
Plus certificates (increase of 17%)
issued to micro-organisations
24
NCSC Annual Review 2023

• Of sole traders, micro and small The Funded Cyber Essentials


organisations, around 30% told Programme
us it was the first time that they’d The Funded Cyber Essentials Programme
implemented the CE controls. was launched to provide support to
• The proportion of organisations that some of the most vulnerable small
say they will recertify (89.2%) and organisations in the UK. Initially targeting
those saying they would recommend legal aid and charity sub-sectors, the
the scheme (78.9%) have both Programme provided funding and
increased. technical support to gain Cyber Essentials
Plus certification. 369 applications were
• The proportion of smaller approved in the first cohort (78% c harities
organisations (<50 staff) say that and 22% legal aid), with over 90% o f
the scheme makes them feel more organisations claiming that they feel
secure (+2.5%), gives them a trusted more confident about cyber security after
source of information (+12.1%), completing the process. The Programme
and that they feel more confident is currently expanding to support small
implementing cyber security controls organisations and start-ups working on
themselves (1.7%) have all increased. emerging and advancing technologies.
• A large proportion of Cyber Essentials
customers (62.1%) report having
learned something new about cyber
security from implementing the
controls, and many were repeat
customers.

Funded Cyber Essentials

369 80%
applications of organisations who have
approved in completed the programme
first cohort have stated an intention to
renew the certification next year.

78% 91%
Charities of these
organisations
claimed that
22% they feel more
confident about
Legal aid
cyber security
firms
after completing
the process

25
NCSC Annual Review 2023

Cyber Advisor scheme


Assuring Industry
This year, the new Cyber Advisor scheme
was launched to consumers, offering
small organisations a network of 56
26
companies assured to
NCSC-assured providers (as of August
offer Risk Management
2023), to help with reliable, cost-effective and Security Architecture
cyber security advice and practical Consultancy
support. This work aims to improve basic
cyber security in small organisations 44
and reduce the likelihood of the most CHECK pen-test
common cyber attacks. providers, responding
Existing schemes continue to grow. to 4500+ requests
Following an update that puts industry
at the heart of the scheme, Assured 56 brand new Cyber
Advisors onboarded
Cyber Security Consultancy now has 26
providers offering risk management and
security architecture consultancy. While 13
assured providers of
the CHECK scheme now has 44 assured
Cyber Incident Response
pen-test providers, who responded to
over 4500 requests last year.
In August, a new Level 2 service was Active Cyber Defence (ACD)
introduced to our assured Cyber Incident Now in its sixth year, the Active Cyber
Response (CIR) scheme. Its aim is to Defence collection of products and
support a wider range and larger number services continues to make the UK
of victim organisations, by providing measurably safer from cyber attacks.
access to high quality, assured incident Threat actors come and go, and the
response services. With 13 providers types of vulnerabilities being introduced
assured across Levels 1 and 2, now more and exploited continue to evolve.
organisations can have confidence that However, most of our ACD initiatives
the company they use has the right address enduring cyber security
expertise to help them. challenges: sharing knowledge of
threats, closing down vulnerabilities,
and responding to breaches. We believe
that automation is the best way of
generating the scale and reach required
to tackle these challenges of today
and tomorrow.

26
NCSC Annual Review 2023

For all these reasons, we see ACD as a We also want to make it simple for users
core part of how the NCSC will improve to find, sign up to and manage our
the UK’s cyber resilience over the coming services, whilst reducing duplication and
years, as we continue to build services providing a smoother, more integrated
designed to protect UK citizens and user experience. We built the MyNCSC
organisations. platform to turn that vision into reality.
When ACD was launched in 2016, The platform brings several ACD products
we developed services with the and services together into a single,
protection of government organisations coherent experience tailored to show the
specifically in mind. However, at the core content, vulnerabilities, and alerts most
of the UK’s National Cyber Strategy is a pertinent to each user. These are currently
‘whole of society’ approach, which is why Mail Check and Web Check. We plan to
we’ve broadened the utility of ACD gradually increase the number of ACD
products and services to a wider range of products and services integrated with
users, from small business owners to the MyNCSC and have started migrating
education and charity sectors to citizens our customer organisations’ use of Early
being able to report scam emails to Warning to the platform.
the NCSC’s Suspicious Email Reporting This year’s ACD report noted the
Service (SERS). This conscious shift to challenges of developing new services,
designing and developing ‘radically which included improvements in levels
simple’ digital services, (with accessibility of defensive capability, the need for
and ease of use as core design a more dynamic commercial cyber
principles) can help provide the benefits security services market, and the growing
of vulnerability checking to those sophistication of commodity threats.
individuals and organisations that do not This has meant embracing different ways
have a dedicated security function. of ‘getting things done’, whether that’s
building services ourselves, contracting
with market-leading UK companies,
or engaging with collaborative projects.

27
NCSC Annual Review 2023

Active Cyber Defence

Mail Check
Helps public and third sector assess and improve
email security compliance to prevent criminals
spoofing email domains. 14,400
• Over 2,700 organisations are now using domains
Mail Check protected
by DMARC
• Over 24,000 domains, 60% of which are
protected by DMARC

Email Security Check


Used to
Available to all UK organisations to help users complete 90,000
check an email domain for two important areas of checks across
cyber security: 34,000 unique
• email anti-spoofing domains
• email privacy

Takedown
The number
Works with hosts to remove malicious sites and of fake UK
infrastructure from the internet. government
• The known share of global phishing dropped to phishing
1.19%, in 2016 the figure was over 5% scams
• Number of fake UK government phishing scams decreased
decreased from 6,300 the previous year to 5,300 by almost 19%
in this reporting period
• 1.8 million cyber-enabled commodity
campaigns removed

Suspicious Email Reporting Service (SERS)


Allows the public to report potential scam
messages for removal by the Takedown service.
• Over 10 million reports received into SERS during 261k scam
the review period URLS have
been removed
• Total number of reports reached over 23.9 million
since SERS started
(since it launched in April 2020)
• 86k scam URLs removed, bringing total takedowns
attributed to SERS since it launched to 261k

28
NCSC Annual Review 2023

Early Warning (EW)

A vulnerability, compromise and open attack


surface notification service.
• Has been integrated into MyNCSC this year and
over 96% of organisations migrated
• Notified about 323,000 unique IP address having
a form of vulnerability and 10,200 unique IPs
about a malware infection
• The top five malware families notified on EW are
Mirai, Andromeda, Conficker, Ramnit, and Pony TOP 5 MALWARE FAMILIES

• The top five vulnerabilities notified on EW are avalanche-andromeda


CVE-2022-41082 (Microsoft Exchange); Exposed downadup
RDP; Open Recursive DNS Resolver; Exposed
gamarue
HTTP Management Service; and CVE-2023-21529
qsnatch
(Microsoft Exchange)
ramnit
• We have 8,704 customers using EW at the end of
the reporting period

Web Check
Helps users find and fix common security vulnerabilities in their websites.

Service
now has

2,999
organisations
using Web
Check

15% 14% 15% decrease*


increase in increase in in urgent findings
unique URLs active assets reported to
scanned using users, along with
Web Check remediation advice
* Web Check is now
provided via MyNCSC.

29
NCSC Annual Review 2023

Exercise in a Box (EiaB)


A free toolkit providing scenarios for
organisations to refine their response to
cyber security incidents.
• New users increased from 16,808 to
21,524 which sees an increase of over
4,500 users which is on par to the
previous year, giving a 28% increase.

Protective Domain Name Service (PDNS)


Prevents users from accessing malicious
HTTPS://
domains or IP addresses.
• Organisations using PDNS rose 20%
(from 1,140 to 1,363)

Check your Cyber Security The NCSC is investigating repeat users to


In March 2023, we launched Check your track effectiveness of mitigation advice
Cyber Security (CYCS), our first free active and additional support required. Currently,
service specifically for small organisations 4% of users have subscribed to reminders,
and sole traders. Through IP and browser signalling a desire by users to utilise the
checks, CYCS identifies and provides tool on a regular basis to monitor their
advice on common vulnerabilities. To date, cyber security enduring usage.
approximately 24% of CYCS users have
an out‑of‑date browser and the most
common browser used is Google Chrome.
FTP and MySQL have been identified as the
most common IP vulnerabilities reported
to users.

30
NCSC Annual Review 2023

Check your Cyber Security

A range of free tools available to all UK organisations to help users identify


common vulnerabilities in their public-facing IT, which now includes Email
Security Check which launched last year as a standalone service and has now
been subsumed into Check your Cyber Security.

18,285 14,672
IP checks browser checks
completed since completed since
product launch product launch
in March 2023 in March 2023

2,526 2,876
users received at users were using
least one finding an out-of-date
browser
00/00/00

Used for 90,000 checks across 34,000 unique domains


Assured services Ensuring there are enough providers
Looking beyond ACD, we’ve also ‘badged’ offering quality services needs the full
certain assured industry services to range of government and industry
help organisations that don’t have levers to be used. For example,
the necessary skills to differentiate larger organisations asking for Cyber
quality. We’ll keep investing in proven Essentials in their supply chain will not
delivery models but stay attuned to only improve resilience, but will incentivise
new approaches as the consumption of more providers to offer the service,
IT services shifts (for example, through upskilling their staff in the process.
cloud provision). However, whilst we can This will help build a thriving cyber sector,
identify quality, we can’t drive quantity; discussed further in this report.
that comes from market demand.

31
prompt:
The importance of cyber resilience for
UK critical national infrastructure​

commentary:
We used a descriptive prompt to
generate an image we feel represents
CNI and how we can digitally
protect our national infrastructure
– the image includes an individual,
to highlight the societal element and
how CNI supports many different
parts of our lives.
NCSC Annual Review 2023

Case study: Securing the UK’s critical


national infrastructure
CNI is evolving The threat has changed…
Critical national infrastructure (CNI) Due to the changing geopolitical
consists of the most important systems environment, including the ongoing war in
in the UK today. This includes those that Ukraine, the rise of state-aligned groups
provide safe drinking water, electricity from around the globe, and an increase in
and keep the country connected to the aggressive cyber activity, it is highly likely
internet. They keep the UK’s economy the cyber threat to UK CNI has heightened
functioning and ensure government can in the last year.
operate as effectively as possible. The NCSC still assesses that ransomware
CNI was historically focused on physical remains one of the greatest cyber
assets, such as buildings, housing, threats to UK CNI sectors. This has
energy and infrastructure. These tend been evidenced by international
to change infrequently, as moving incidents including attacks against
infrastructure to an entirely new industrial Colonial Pipeline and the Irish Health
estate didn’t happen often. However, Executive, and within the UK against
the pace of change sped up as the UK South Staffordshire Water, Royal Mail
became more dependent on digital International and even one impacting
infrastructure. The systems underpinning NHS 111. Some of these attacks have also
communications, financial networks, highlighted the possibility of disrupting
and the internet change more rapidly CNI through attacks on key suppliers,
and are often highly distributed. Our who may have weaker security and thus
understanding of CNI has also evolved, present an attractive opportunity for
moving towards a more holistic view adversaries.
of critical systems rather than purely While criminality online is the most
physical assets. These systems often significant threat in terms of volume,
operate independently of UK-based the most advanced threats to CNI come
infrastructure. These changes have from nation states, including Russia,
delivered immense opportunities for China, Iran, and DPRK.
the UK while simultaneously reshaping
the risks associated with our CNI and In May, the NCSC issued a joint
our approach to managing them. advisory revealing details of ‘Snake’,
a sophisticated espionage malware
used by Russian cyber actors against
their targets. These targets included CNI
operators, and the targets were in more
than 50 countries across the world.

33
NCSC Annual Review 2023

There is sometimes a misconception While we don’t believe, right now, that


that state activity is all about espionage. anyone has both the intent and capability
Or that it is only targeted at trying to to significantly disrupt infrastructure
steal government secrets. But that’s not within the UK, we know that we can’t rely
the case. on that situation persisting indefinitely.
Uplifting cyber resilience can take
Another joint advisory issued by the NCSC
several years to achieve, so it’s therefore
earlier this year exposed China state-
important to prioritise that uplift before
sponsored activity targeting networks
the threat further materialises against our
across CNI sectors in the US and it carried
CNI or its key dependencies.
a warning that the same malicious
techniques could be applied worldwide. The threat is evolving. While we are
making progress building resilience
It detailed how the actors had been
observed taking advantage of built-in in our most critical sectors, we aren’t
network administration tools on targets’ where we need to be. We will continue to
systems to evade detection after an initial work with partners across government,
compromise. industry and regulators to accelerate this
work and keep pace with the changing
This kind of latent threat activity cannot threat, including tracking their resilience
be discounted and it demonstrates the in line with targets set out by the Deputy
interest that state-sponsored actors have Prime Minister.
not only in compromising CNI networks
but persisting there too. Situational awareness

Jen Easterly, Director CISA, noted that To counter the risk posed by these
such targeting “…wasn’t for espionage threats, we believe that it’s essential to
or data theft… it was more likely for understand the risks to our CNI before our
disruption and destruction” and CNI adversaries do, so that we can reduce
operators should be alert to this and the window where an attack could be
follow the actions in the advisory to hunt successful. Often critical services will rely
down this activity and mitigate. on complex supply chains to function
and so mapping supplier dependencies
Nation states and profit-oriented cyber and relationships plays a crucial part
criminals are not the whole picture, in gaining confidence in your security.
however. The NCSC published an alert to This enhanced situational awareness
operators of the UK’s CNI in April about the will be increasingly important in times of
emergence of state-aligned groups as heightened threat – but being mindful
an adversary, some of whom have stated about supply chain security from
a desire to achieve a more disruptive procurement through to deployment
and destructive impact against western should be a perennial consideration
CNI. Without external assistance, we for operators.
consider it unlikely that these groups have
the capability to deliberately cause a In addition to our work understanding the
destructive, rather than disruptive, impact UK’s CNI, we need to continue improving
in the short term. But they may become our aperture on CNI risk. For example,
more effective over time. it will be key to understand flaws in
the design of the UK’s CNI (such as
inadequate network segregation) which
adversaries may seek to exploit, as well

34
NCSC Annual Review 2023

as maintaining awareness of unmanaged The NCSC, as national technical adviser


vulnerabilities and the attack surface for cyber security, is central to this work,
visible to adversaries online. It may also in particular by helping government,
be necessary to expand threat hunting regulators and industry to measure and
for nation states who could seek to validate the necessary improvements
pre‑position on UK CNI. in CNI cyber security and resilience,
including through the development of
Prioritising cyber security
the Cyber Assessment Framework (CAF)
The UK’s CNI is operated by public which has been widely adopted.
and private sector organisations.
However, in addition to raising the
However, while they are subject to the
security baseline, it’s also important for
ever‑increasing threats described
organisations to understand how they will
above, they also face a range of other
address periods of heightened threat, as
commercial pressures and therefore
we are seeing now. Those organisations
tackling cyber threats is not always
need to have worked through how they
prioritised as highly by CNI operators as
will temporarily increase their cyber
we would like.
security and resilience measures, at all
Operators of the UK’s CNI may be levels of the organisation, to minimise
positioned to deliver shareholder value the likelihood of a successful attack and
and profit, incentives that can take priority to have proactively worked to reduce the
over investment in the secure operation impact should an attack occur.
of critical systems. Firms with less mature
security can also be incentivised to What should we do next?
constrain information sharing during The NCSC has worked to address these
incidents, limiting the NCSC’s ability to challenges by supporting the creation of
effectively support and respond. a revised criticalities process to identify
and assess critical systems across the
The public sector, whilst not motivated
UK. In addition, we have helped create
by profit, prioritises the delivery of these
the Knowledge Base, a world-leading tool
critical services, but unfortunately, this
which permits government to understand
can also come at the expense of security
the relationships between and impact
considerations.
of any disruption to critical systems,
The NCSC has been working with regardless of the hazard involved.
government, industry, and regulators to
To better understand the resilience of
address this imbalance. The government
these systems, the NCSC created the CAF
has set targets for CNI operators to
as a framework to assess cyber resilience
achieve resilience against common
and worked with regulatory authorities to
attack methods as quickly as possible
set thresholds for security and resilience
and to put in place more advanced
based on preventing, detecting, and
protections where appropriate. Effective
recovering from historic and plausible
regulation plays a key role so the
future attacks. This has helped to pull
government is also strengthening the
together the NCSC’s expertise, enabling
regulatory framework, to improve its
organisations to have a much greater
coverage, powers, and agility to adapt,
understanding of their cyber resilience,
within the context of broader national
and take action to improve it.
security risk and rapidly changing threat
and technology.

35
NCSC Annual Review 2023

However, we need to keep progressing We also need to continue to forge better


these efforts. We need to continue international partnerships to ensure that
to work together as a community to we can learn from and work together with
address the gaps in the UK’s cyber governments, industries, and relevant
security posture. This starts with forums overseas on this shared
gathering better data to improve our challenge. It’s clear that we all depend
visibility and better inform our decision on similar infrastructure and face similar
making. We need to understand where threats, and so creating a common toolkit
organisations commonly struggle to for managing them is key. We’ve therefore
address security challenges and how continued to run closed information
adversaries are attempting to exploit exchanges with key CNI operators and
those weaknesses, so that we can work participate in international forums to
as a community to address such gaps. better drive-up standards.
The NCSC, in collaboration with industry, Working to limit the impact of cyber
wider government and regulatory bodies, attacks against the UK’s CNI, especially
is thus analysing data on the cyber those conducted by nation states,
resilience of UK CNI, to better understand is challenging but achievable. It’s
how we can help ensure the resilience of something that we need to do together.
our CNI.

36
prompt:
An illustration of a historic ballot box
protected by multiple padlocks.

commentary:
We used a relatively simple prompt
to generate an image bringing to life
the need to secure our democratic
process – metaphorically represented
through a super-secured, physically
protected ballot box.
NCSC Annual Review 2023

Case study: Defending our


democracy in a new digital age
– at the ballot box and beyond
With a general election on the horizon, the Responding to threats
NCSC signals the security challenges our Protecting our democracy in cyberspace
democracy faces online. requires a continuous effort as the cyber
From generative chatbots to ultrafast threat to the UK’s democratic institutions
connected devices, the speed and scale and processes is significant and comes
at which technology is changing our from many malicious actors.
everyday lives has rarely been so evident. Over the past year, the NCSC has surged
The evolving landscape presents many its efforts to advise on the smooth running
opportunities and efficiencies for our of local elections, political party leadership
economy and society, but we must contests and once‑in‑a‑generation
also ensure our democratic institutions, constitutional events such as the
traditions and values are well prepared Coronation of His Majesty the King.
for this new phase in digital development. We have supported a range of entities
With elections on the horizon, including involved in the democratic process
a general election, and with people with their responses to cyber incidents,
around the world set to go to the polls ranging from phishing attacks to more
from Belgium to the US in the next sophisticated compromises.
year, the UK and its allies cannot be And we have provided longer-term
complacent to the threat of foreign cyber guidance for improving resilience, both
interference and attempts at influencing across supply chains that underpin
our democratic processes. The NCSC is the functioning of key services and to
working with our allies around the world individuals active in our democracy, such
to share insights and approaches to help as politicians, where we have seen them
improve collective cyber resilience of being targeted.
global democracy.
Looking ahead
Defending democracy is a critical part of
The next general election is set to
the NCSC’s mission as it gets to the heart
take place before the end of January
of what it means to keep the UK safe,
2025, with local and mayoral elections
and to act responsibly, in cyberspace.
scheduled next May. The NCSC is already
As part of a cross-government working with key stakeholders across
effort, alongside partners in industry, government, UK parliament, the devolved
civil society and others, we are working administrations and legislatures, and
to protect the values at the foundation of industry to prepare for it.
our society.
When the UK goes to the polls, the act
of casting your vote is completed using
pencil and paper, significantly reducing
the chances of a cyber actor affecting the
integrity of the results.

39
NCSC Annual Review 2023

sector organisations to strengthen their


defences – even if their involvement in
However, the act of voting marks the end
running elections is indirect.
of the sprint, as a significant amount of
cyber-resilience building needs to take And technological developments,
place before this to secure the services including artificial intelligence, are
which support our elections and the shaping at pace how we think about the
integrity of an open public discourse. security outlook.
The government’s Defending Democracy The NCSC assesses that democratic
Taskforce has established the Joint events, such as elections, almost
Election Security Preparedness unit certainly represent attractive targets for
(JESP), which takes overall responsibility malicious actors and so organisations
for coordinating electoral security and and individuals need to be prepared for
drives the government’s election threats, old and new.
preparedness.
Novel threats
It plays a central role in convening AI has the power to transform our society
government departments, the devolved for the better, but at the NCSC we are
administrations and legislatures, and alert to the risk that these technologies
security resources to ensure our systems might pose from those looking to interfere
and processes are resilient. or otherwise undermine trust in our
And for those who have a direct role to democratic system.
play, the NCSC has existing defending While the UK’s use of paper voting in
democracy guidance, which is currently General Elections makes it significantly
being refreshed. We strongly encourage harder to interfere with our elections, the
following the recommended steps to next election will be the first to take place
ensure online protections are in place. against the backdrop of significant
An evolving landscape advances in AI. But rather than presenting
entirely new risks, it is AI’s ability to enable
The threat landscape has evolved
existing techniques which poses the
significantly since the 2019 general
biggest threat.
election.
For example: large language models will
The changing geopolitical situation,
almost certainly be used to generate
especially with the war in Ukraine, has
fabricated content, AI-created hyper-
made the prospect of influencing the
realistic bots will make the spread of
political discourse in democracies ever
disinformation easier and
more attractive to state actors.
the manipulation of media for use in
The emergence of state-aligned actors, deepfake campaigns will likely become
who share similar goals to nation states more advanced.
but can act with less restraint, has
Any interference or attempts to
created a new class of adversary for the
undermine our political discourse are
UK to counter.
completely unacceptable and the UK
The shape-shifting rise of ransomware government is committed to enhancing
and extortion attacks, as outlined in a our capabilities and countering the threat
recent joint report with the National from online harms, such as
Crime Agency3, has emphasised the disinformation.
ongoing importance for public and
private
3 https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem

40
NCSC Annual Review 2023

However, it is important for the general Defending our values


public to be aware that the threat Protecting individuals who carry out
landscape is changing and as with important roles in our democracy is a
any kind of new technology, alongside key part of improving resilience and
realising the benefits, there is always reducing the chances for malicious
potential for misuse. actors to interfere.
High-risk individuals However, the threat to our democracy is
Good cyber hygiene is important for part of a much bigger picture, with the
all citizens but for those who work in threats we face also posing a risk to our
particularly high-risk roles or have values shared around the world.
access to sensitive data, vigilance is In cyberspace, there are no borders, and
crucial. One of the most notable trends we know authoritarian governments are
we have seen over the past year is a rise increasingly using cyber means to target
in individuals’ personal accounts being and repress critics, dissidents, and civil
targeted. This is not a mass campaign society at home and abroad.
against the public but a persistent effort
The use of cyber capabilities to
to target people whom attackers consider
undermine our freedoms is a global issue
might hold information of interest.
requiring an international response and
This kind of activity is not new. In January, as a responsible cyber actor the UK is
the NCSC warned that Russia-based and engaging in initiatives.
Iran-based actors had been conducting
spear-phishing campaigns against Collective action
politicians, journalists, activists and Defending the UK’s democratic institutions
other groups. 4 However, these types of and processes is a priority for the NCSC.
campaigns continue. However, it is not something we can
achieve alone.
In particular, we have seen personal
accounts targeted instead of corporate It requires a collective effort across the
ones, as security is less likely to be whole of society, including industry and
managed in depth by a dedicated team. in partnership with allies, to defend our
The NCSC has therefore expanded its values and make the UK an unattractive
work to offer more personal support to environment for hostile actors.
those at higher risk. Our democracy is founded on the
Earlier this year, we launched a new opt-in principle of participation; every member
service which allows us to alert high-risk of the public across the four nations of the
individuals directly if we identify evidence UK has a stake, and everyone has a role
of malicious activity on their personal to play in defending it.
devices or accounts, and to swiftly By acting now to strengthen systems
advise them on steps to take to protect and accounts – rather than waiting
themselves. until an incident occurs or an election is
called – we can help make our society
safer online.

4 https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest

41
commentary:
We used a very descriptive prompt to generate the image
we envisaged of how smartphones, computers and the
internet have become a fundamental part of modern life
and that it’s difficult to imagine how we’d function without
them. From living and working online, banking and
shopping, and email and social media the imagery talks
to our strategic objective of bolstering the cyber resilience
of individuals, families, businesses and organisations
across the world.
NCSC Annual Review 2023

Case study: The next generation of


UK cyber security services
When the NCSC was set up in 2016, But we all know cyber security never
a central aim was to identify and stands still. For example, the general
implement ideas to improve the UK’s challenges our ACD products and
cyber security, at reach and scale, in services seek to address endure – find
ways we could measure. From this came and fix vulnerabilities, share actionable
our suite of ACD initiatives designed to knowledge about threats, detect and
reduce the vast number of relatively respond to breaches – bu t they shift as
unsophisticated attacks that impact those threats develop and as the way
people and organisations across the UK, technology is used changes constantly,
by harnessing automation and data. for everyday life, for attack and
That core aim also drives the work we do for defence.
to assure cyber security services provided The big question we’re focused on here
to businesses and consumers by the is how to use what we’ve done and
wider cyber security industry. We assess learnt so far to chart the course for cyber
what industry is providing against NCSC security services in the UK to the end of
standards and use the NCSC brand the decade. How can government and
to help consumers identify services industry develop and deliver the holistic
that they can trust. This assurance cyber security “offer” needed to keep the
encourages users to take up the services UK the safest place to live and work
that provide the biggest benefits to online? Closer to home, what should the
national cyber security, at a reach and NCSC do and – increasingly – how
scale that government could not achieve should it support others?
by itself. It also stimulates the market
to develop solutions to the existing and
emerging cyber security challenges that
we all face.
Together, these industry and NCSC-
developed services provide a powerful
set of solutions to a broad range of
cyber security problems. They’ve
had real impact as the Resilience
section of this Annual Review shows in
numbers. ACD has provided a model for
partner nations to adapt to their own
national contexts and set the scene for
overarching regulatory concepts.

43
NCSC Annual Review 2023

Where do we go from here? On innovation: as a national technical


We’ve come a long way by focusing on authority we deal every day with the
what the NCSC can – in collaboration cyber security problems our customers
and partnerships with others – i magine, face, and the way those challenges are
build, test and deliver. If our intention is likely to develop in future. We combine
reach and scale, we think the time is right our technical expertise and relevant
for an ambitious expansion in scope and relationships from government, academia,
purview. That means taking a fresh look at: and industry to develop solutions that can
be tested against the challenges that we
− The NCSC – as a national technical
all face. This approach is at the heart of
authority and part of GCHQ – focusing
ACD, and we want to get back to doing
on the things it does best, working in a
more of it.
different way with...
On data: the cyber security community is
− …new centres of cyber security
on a journey of turning cyber security from
excellence and endeavour being
an art, dependent on a few expert
developed by government under the
individuals, to a science that can be
auspices of the 2022-2030 Government
scaled. At its heart, this requires data;
Cyber Security and 2023 Fraud
so that knowledge can be shared,
Strategies, and…
hypotheses tested and impact measured.
− …combining with the broad capacity It’s not always easy, but it is essential. Our
and capability of industry and experience to date (and the history in other
academia to catalyse and incentivise fields, such as medicine) is that such an
development and delivery of the range approach results in significantly improved
of services the UK needs and an outcomes, transparency and trust.
evidence-based approach to their
Over the past year we’ve been exploring
evaluation.
with partners the challenges defender
Getting the relationships right between communities have working on together
these three is key to making sure that at an organisational, sector or national
everyone living and working in the UK level. It’s clear that data is going to take
feels the benefit of cyber security at a an increasingly important role in helping
national level. defender communities to defend as one,
in an efficient and increasingly evidence-
What should the NCSC’s future
backed way.
contribution be?
Working together is the best way to build
The NCSC vision for its digital and assured
the picture of vulnerabilities and threat we
industry services is to focus in on the
need to defend the UK. Next year NCSC
things we’re set up to do best: innovation,
will be working to address some of the
data, and partnerships.
challenges identified this year, making it
simpler for defender communities. We’ll
also be doing the things only NCSC can do.

44
NCSC Annual Review 2023

We will continue to publish our findings The May 2023 Fraud Strategy emphasises
in line with the NCSC’s commitment to “tackling fraud at source and incentivising
transparency and responsible use of every part of the system to take fraud
artificial intelligence et al. seriously”. This reinforces the need for a
On partnerships: nearly everything that whole ecosystem of support across the
the NCSC does, we do with our partners in UK that builds on the unique strengths of
some form. The challenge of scaling cyber the NCSC as national technical authority
security means that we need to better in concert with the ability of the PROTECT
leverage our existing partnerships and network and Cyber Resilience Centres
develop new ones to make much more amplifying on the ground across the
out of them than we currently do where nation.
our services are concerned. We need to And beyond that?
do this in multiple areas: for example, we
It remains a strongly held NCSC view
are working closely with the UK Cyber
that the “team” extends well beyond
Security Council to develop and oversee
government when it comes to achieving
the specialist standards the UK needs to
cyber security success at the national
manage its cyber risk, enabling NCSC to
level. Over the past 12 months, the NCSC
focus on other areas.
has been working with industry to launch
How do we need government’s cyber new schemes, targeting a wider set of
security capabilities to develop? customers, and assuring industry to work
We often say that cyber security is a team in new and expanded areas on behalf of
sport. What might that mean for the way the NCSC – and there is more to come.
the NCSC needs to work with government But where do we see potential to drive
partners on the future of digital and systemic improvement?
assured industry services? Two recent
developments show us the way.
The first is the development of the
Government Cyber Coordination Centre
(GC3), announced in 2022, which will
coordinate cyber security efforts across
the public sector. The GC3 will start by
coordinating resilience response to
incidents and vulnerabilities”, transforming
how cyber security data and threat
intelligence is shared, consumed, and
actioned across government. This
presents a huge opportunity to galvanise
the way services are developed, delivered,
and used over the coming years, and to
build the foundations for an approach to
government cyber security that is driven
by data and rooted in evidence.

45
NCSC Annual Review 2023

Simpler, more accessible services An exciting future


Our work with small organisations, We’re confident that, in close
backed up by research, highlights a need partnership with our colleagues
for products and services that help users across government, our collaborators
find and fix basic vulnerabilities in their in academia, and our friends in
websites, email configuration, and industry, the coming years are full of
infrastructure. These need to be opportunities. Getting cyber security
optimised for ease of use so that users right allows companies and
can take manageable steps that bring organisations to flourish; if we don’t,
about modest but effective reductions in the risks – whether to businesses or to
risk from commodity attacks. Industry- the functioning of society – can be
provided services Cyber Essentials and existential. Only by working together
Cyber Advisor give trusted expertise, can we develop, deliver, and make
whilst the initial NCSC contribution has best use of cyber security services
been to prove the concept through that we will all need to continue to live
services like Check Your Cyber Security and work safely online.
(now incorporating Email Security Check)
and we plan to do more. But – back to
reach and scale – what we really want to
do as a national centre is develop the
general statement of what good looks
like for this family of products so that
others can lead the charge.
Cyber security as science
As a data-driven organisation,
measuring the impact of these services
is critical to ensure we are making a
difference. But it's hugely challenging
and still needs significant research. The
four Research Institutes, supported by
the broader Academic Centres of
Excellence in Cyber Security Research
community, offer access to world class
academics which will continue to help
us tackle this challenge.

46
Chapter 3
> Ecosystem
NCSC Annual Review 2023

It is estimated that the UK cyber Rising employment figures, with a 10%


growth in the cyber sector last year,
security sector is now worth
demonstrate that we are moving in the
£10.5 billion5, with close to 2,000 right direction. However, a shortage of
firms in the UK now actively skilled candidates in the labour market
providing cyber security products with the appropriate technical cyber
and services, employing over security skills is still cited as the single
biggest barrier (44%) to recruiters.
58,000 people – an increase of
Another area of focus within the
over 5,000 jobs over the past year.
ecosystem is equality, diversity, and
The sector is growing, as is the inclusion - an issue that the NCSC is
need for talented professionals6. addressing at an organisational level,
Cyber security remains the as well as within the wider ecosystem too.
largest UK security exports The NCSC understands the importance
sub‑sector, with UK cyber exports and impact of an inclusive ecosystem,
within our organisation and within the
increasing from £4 billion in 2020
wider sector too. Initiatives like the
to £5 billion in 2021, a growth rate CyberFirst Girls Competition address an
of 20%. under-represented female workforce.
A fresh drive to remove barriers to entry
The NCSC plays an important role to our Assured Services schemes was
in strengthening the country’s cyber also kickstarted, encouraging providers
ecosystem, cultivating talent and that tackle issues of under-representation
developing young minds to future-proof in the cyber security workforce to apply.
our national security. We continue to
deepen our efforts in ensuring skilled By developing a diverse, technically
people, quality products and trusted skilled workforce and supporting an
services are readily available to support innovative and forward-looking industry,
organisations of all shapes and sizes. the NCSC’s initiatives and schemes are
strengthening both the UK’s resilience and
An essential part of this work is cultivating its world-class cyber ecosystem.
fertile ground for excellence, at every
stage – whether that’s through secondary
or higher education or bringing together
innovative startups. The NCSC is
inspiring school pupils and providing
undergraduate opportunities; highlighting
universities that commit to excellence in
cyber security research and education,
helping new businesses create solutions
to the UK’s biggest cyber challenges,
and assessing and assuring industry to
support a thriving cyber security sector.

5 UK cyber security sectoral analysis 2023 – GOV.UK https://www.gov.uk/government/publications/


cyber-security-sectoral-analysis-2023/uk-cyber-security-sectoral-analysis-2023
6 UK defence and security export statistics 2021; https://www.gov.uk/government/statistics/uk-
defence-and-security-exports-for-2021/uk-defence-and-security-export-statistics-2021

48
NCSC Annual Review 2023

UK’s cyber security sector at a glance

£10.5 billion 1,979 58,005


 UK cyber security  cyber security firms  (full-time equivalents)
sector worth (up 7.7%) people working in a
£10.5 billion (up c.3%) cyber security related
role (up 10%)

Inspiring talent award for “first-rate technology and cyber


The NCSC’s CyberFirst programme, which security teaching”. Since the initiative
provides opportunities for young people launched in 2020, 105 schools and colleges
to get into cyber security, saw nearly have attained CyberFirst recognition for
9,000 girls take part in this year’s Girls helping to develop cyber ecosystems
Competition. Over 56,000 girls have now around the UK. This summer also saw
taken part in the competition since 2017. 2,500+ students apply for 800 places at our
The CyberFirst Schools & Colleges scheme week-long camp; 43% of applicants were
saw an impressive 48 more schools and from female students and 47% from ethnic
colleges receive a CyberFirst schools minority communities.

49
NCSC Annual Review 2023

CyberFirst Girls Competition CyberFirst Bursary Scheme

56,000+
girls have taken part in the 125 students joined CyberFirst
bursary scheme
competition since inception in 2017

42%
589 schools of those awarded
and 13 regional bursaries were female
2,444 teams and national
took part finals
22% of those awarded
bursaries were from
2023 ethnic minority
backgrounds
2022

85%

Total 87%
number of
of those who
bursary
students have graduated
8,700+ girls 85% of schools
1,169 are now in cyber
entered, up from participating in the
security roles
7,000 last year Girls Competition
were state run

Nurturing skills
The CyberFirst Bursary programme Over the last year, a further 14
continues to support the next generation postgraduate and 5 undergraduate cyber
of cyber talent, offering undergraduates security focused degree courses have
a substantial bursary and paid training met the NCSC’s certification standard.
each summer. This year, 125 students Prospective students now have a choice
were offered new bursaries and of those of 75+ p ostgraduate or undergraduate
42% were female candidates. In addition, NCSC-certified degrees from just under
the programme is supported by over 50 universities nationwide. And our
240 industry, academic and government community of Academic Centres of
members. Excellence in Cyber Security Education
(ACEs-CSE) continued to expand with 15
universities now achieving recognition for
their high-quality teaching and impactful
outreach activities.

50
NCSC Annual Review 2023

Fuelling innovation the next generation of entrepreneurs.


The NCSC for Startups programme Over 95 students from NCSC-certified
continues to grow, with companies such degree courses took part in the 3-day
as RevEng.AI and Lexverify harnessing events, giving them the opportunity to
artificial intelligence in innovative put their cyber studies into practice and
ways. We also ran a series of activities create solutions to real-world cyber
to support programme graduates on security problems.
their growth journeys. Our alumni have Over 95 students from NCSC-certified
now raised over £512m in investment degree courses took part in the 3-day
and created over 1,600 jobs. In Belfast, events, giving them the opportunity to
at CYBERUK 2023, we hosted a local put their cyber studies into practice and
startups workshop focusing on improved create solutions to real-world cyber
collaboration between academia and security problems.
industry. We also delivered Innovators
Challenge events nationwide to inspire

Academia

14 postgraduate and 5 undergraduate degrees taking the total now


to 77 degrees from 49 universities throughout the 4 nations of the UK

15 Academic Centres of Excellence in Cyber Security Education


(ACEs-CSE) (12 Gold and 3 Silver Awards)

51
NCSC Annual Review 2023

Highlights include:
NCSC For Startups
• the NCSC’s work to bring Fujitsu into
the i100 community was included in
the PM’s G7 announcement launching
the Japan-UK Cyber Partnership
• the scheme directly contributed
66 external expertise to NCSC’s work
to deliver:
companies are part
of NCSC For Startups − UK Legal Sector Cyber Threat report
− NCSC’s Cyber Security Toolkit
for Boards

£512m+ − Cross financial sector incident


playbook
total investment
raised (previously CYBERUK 2023
£430m) The UK government’s flagship cyber
security conference, CYBERUK was held
for the first time in Northern Ireland
ensuring that we have hosted the event
1,600+ across the United Kingdom. Already
recognised globally as a hotspot for
jobs created cyber security innovation, by 2030 it is
(previously 700) estimated that the cyber security sector
could add £437m in value to the Northern
Irish economy, generating £2.9bn
cumulative Gross Value Added over the
i100 scheme next decade.
Between September 2022 and August
Our commitment to ensuring a diverse
2023, the NCSC’s Industry 100 (i100)
skills pipeline was demonstrated with
scheme has continued to grow and
a dedicated Ecosystem Zone bringing
make a positive impact on our mission.
together key academic and industry
An additional 41 new participants
partners – i ncluding CyBOK and the
joined the scheme this year seeing the
UK Cyber Security Council – who,
community grow to 123 with a further 98
with the NCSC and DSIT are creating an
ongoing enquiries.
ecosystem that is self-sustaining,
ensuring dynamic and inclusive delivery
and support to the UK’s national security
and prosperity.

52
NCSC Annual Review 2023

Event facts Delegate feedback

Held in Northern
Ireland for the Two
first time
thirds
of delegates are
£2.6m more likely to invest in,
boost to the support or engage with
local economy the Northern Ireland cyber security
sector as a result of attending

2,350+ in-person delegates


from 38 countries,
with 10,000 views
online during the Over
event period 93%
rated the event as
170+ good/excellent
speakers across
37 sessions, including UK
Deputy Prime Minister the Rt Hon Nearly 90%
Oliver Dowden, UK Minister of State
for Security the Rt Hon Tom felt more informed
Tugendhat, and Acting National on how to secure an
Cyber Security Director to the open and resilient
White House Kemba Walden digital future

120+
companies sponsored
or exhibited at CYBERUK

53
Chapter 4
> Technology
NCSC Annual Review 2023

As technology develops, the Artificial intelligence (AI)


cyber security threat we face is The whole field of artificial intelligence
is developing at a phenomenal pace.
evolving too. Since the launch of
In this rapidly evolving arena, we must
ChatGPT, the interest in Artificial ensure that cyber security is both a
Intelligence (AI) has taken off core requirement of AI technology
dramatically. There is rarely a throughout its life cycle and integral to
its development from the outset.
day when AI does not feature
in national news. The NCSC has Our primary objective is to ensure
that cyber security does not become
been researching AI security
a secondary consideration but is
for several years and has been recognised as an essential precondition
working with our international for the safety, reliability, predictability,
counterparts, as well as the and ethics of AI systems.
public and private sector in Taking a ‘secure by design’ approach
the UK, to realise the benefits to development will help society and
organisations realise the benefits of
and protect against the risks
advances in AI, but also help to build
associated with AI. wider trust that AI is safe and secure
But there are other critical areas of to use.
technology which don’t make the In the last year, we have published three
headlines as often which the NCSC blogs about the risks associated with
considers just as important in the future. AI and large language models (LLMs),
These include semiconductors (as core spoken at conferences globally to
components of all electronic devices), emphasise the importance of building
cryptography (that will keep our data safe AI technologies on secure foundations,
from the threat from future large-scale and have shaped the government’s
quantum computers) as well as telecoms AI agenda.
security, socio-technical research,
and assessing risks from radio frequency Quantum computing and
transmissions. The NCSC has contributed semiconductors
to two national technical strategies led by DSIT has published two national technical
the Department for Science, Innovation strategies in the past year covering
and Technology (DSIT), providing expert emerging technologies that have critical
cyber security advice on building implications for cyber security, and
resilience to protect our national security. experts in NCSC have advised on the
The importance of secure and resilient technical positions in those strategies.
critical technology is never far from the
NCSC’s mind. In the past year, we have
published 15 pieces of guidance, 53 blogs
and set out the five most significant
‘cross-cutting’ problems which the NCSC
believes need concerted and significant
collaborative effort over the next decade
in our research problem book (which we
discuss in further detail below).
56
NCSC Annual Review 2023

The National Quantum Strategy focuses Two problems worth specific mention are:
on investment in and development
Problem 1 – H ow can we build systems
of quantum technologies. Quantum
we can trust when we can’t trust any of
computing has substantial economic
the individual components within them?
potential, but also provides a threat to
Hardware is becoming more complex
cryptography. The NCSC’s role is clearly
all the time and it’s difficult to gain
defined within the strategy as the lead
confidence in long global supply chains.
organisation in government on advising
This in turn means diminished confidence
on mitigations to this threat. The strategy
in individual computers, circuit boards
also sets out our key technical messages,
and microchips. But to protect our critical
focusing on the need to prepare for
national infrastructure, defence and
a future transition to post-quantum
intelligence systems and more besides,
cryptography. Additionally, through
we need to build computer systems we
discussions as part of the strategy
can rely on.
development, and with the UK Quantum
Communications Hub, we have helped Problem 5 – H ow can we accelerate the
set a government vision for future adoption of modern security mitigations
quantum networking to share information into OT? Operational technology (OT),
between quantum devices. such as the industrial control systems
(ICS) that operate factories, smart cities
Building on the UK’s specific
and our energy infrastructure, often
semiconductor strengths, DSIT’s National
lack many of the security controls and
Semiconductor Strategy focuses on
mitigations that we take for granted in IT.
the resilience of systems on which we
This means that if threat actors manage
rely to combat cyber attacks. The UK’s
to reach OT systems, they may then be
leadership on chip design positions us
able to use relatively simple techniques
well to take a leading global role in this
to have a physical real-world impact.
area, supporting initiatives such as the
Research in the areas below could
‘Digital Security by Design’ programme
contribute to significantly improving the
led by UK Research and Innovation,
security of OT systems.
which offers a potential step change in
attack mitigation. Technology assurance
As technology, and the way it’s used,
The NCSC research problem book
continues to evolve at a rapid pace,
In August, we published the latest
the need to update the way we gain
iteration of the NCSC research problem
confidence in its cyber resilience
book with the aim of guiding cyber
came into sharper focus this year.
security research towards the most
Any new approach must raise the bar
critical security challenges that we
across a broad landscape and also
have identified as significant barriers to
enable new technology solutions to be
improving cyber security.
imagined, creating a thriving ecosystem
underpinned by cyber-resilient
technology. This year, in collaboration with
Adelard, we’ve formalised the method
that underpins our new approach to
technology assurance: Principles Based
Assurance (PBA). Key to the success

57
NCSC Annual Review 2023

of making PBA a reality is the ability Vulnerabilities


to leverage industry partners, and The number of Common Vulnerabilities
so the NCSC has also begun the first and Exposures (CVEs) in commodity
steps towards standing up our national technology continues to rise, a trend
network of Cyber Resilience Test Facilities we expect to continue. There are many
(CRTFs) which will independently assess factors that contribute to an over
a range of technologies at scale, that 50% growth in reported vulnerabilities
has a national impact in uplifting cyber over the past five years, which include
resilience. for example, a greater motivation to
Technology crosses many international discover and report vulnerabilities.
boundaries, both in terms of sales and The rise does not necessarily imply a
interoperability, and the NCSC recognises worsening security posture, but rather a
the importance of mutual recognition greater level of discovery capacity and
between PBA and other assurance capability within government, industry,
schemes. To this end we’ve continued our and academia to find latent issues.
international dialogue, as well as across More indicative of the security posture,
the different parts of UK government, to is to assess reported vulnerabilities
ensure that this new assurance regime against a measure of ‘forgivability’.
can have the greatest impact possible. Vulnerabilities that come about because
of development constructs that are
UK Telecoms Lab (UKTL) known to carry greater degrees of
Telecoms networks are fundamental risk and that are so trivial to find they
to the security of the UK’s digital are almost immediately apparent by
infrastructure and digital economy. inspection are examples of ‘unforgivable’
To help test, research and improve the vulnerabilities. No technology will ever be
security of telecoms equipment, DSIT devoid of bugs, and some of these bugs
have established a new state-of-the-art will turn out to be exploitable security
UK Telecommunications Lab in Solihull, vulnerabilities. But even though the
operated by the National Physical concept of unforgivable vulnerabilities
Laboratory (NPL). Advice from the NCSC’s was introduced over 15 years ago, such
world-leading telecoms security experts vulnerabilities are still being found –
has been central to the success of the sometimes in major products produced
programme. The need for the facility was by companies. It is this situation which
first recognised by DCMS and the NCSC needs to change both for current and
in 2019, and the creation of this facility future technologies if we are to achieve
in 2023 is a key milestone after years of our objective of a safer and more
effort, and testament to a successful resilient society.
partnership between DSIT, NCSC and NPL.

58
NCSC Annual Review 2023

Security-conscious developers will not It has been hugely successful. So much


only seek to avoid the unforgivable so that the VRS, as described in the
vulnerabilities, but to put a process in Government Cyber Security Strategy, will
place to receive and mitigate more move into the developing Government
complex vulnerabilities that are more Cyber Coordination Centre (GC3), a joint
subtle and can be forgiven for their venture with the Cabinet Office. This move
presence. Some vendors choose to will help the VRS deliver more effective
operate a bug bounty programme, coordination and further improve the
which pays researchers for vulnerabilities resilience of the UK government.
they submit. When the NCSC receives a Earlier this year, the finder community
bug bounty payment for vulnerabilities were key to reporting cross-site scripting
that we have disclosed, we donate the vulnerabilities affecting Citrix ADC and
money to charity. Earlier this year we Citrix Gateway instances across UK
disclosed a vulnerability in Chrome that government. In 2021, finders reported and
was fixed and assigned CVE-2023-1530. helped UK government rapidly remediate
The disclosure was also awarded a vulnerabilities affecting Microsoft
$7,000 bug bounty that Google doubled Exchange servers.
to $14,000 when it was donated to charity.
We would like to thank our partners in
Vulnerability Reporting Service helping us create the VRS and we will
Over the past five years the NCSC’s be showing our thanks to our finder
Vulnerability Reporting Service (VRS) has community by awarding NCSC Challenge
helped secure government systems and Coins to those finders who have shown
services from a wide range of security themselves to be exemplars of the
issues, such as cross-site scripting vulnerability disclosure community.
vulnerabilities and dangling domains,
preventing the reported vulnerabilities
from turning into incidents.
The VRS has provided the people
reporting vulnerabilities – the finders –
with a route to report these vulnerabilities
and a way to directly communicate and
include the system owner. The VRS has
also raised awareness of vulnerability
disclosure with system owners and
demonstrates how it can help secure
the systems, products, and services
they manage.

59
NCSC Annual Review 2023

Researchers (the finders)


Annual breakdown of researchers

200

150

100

50

0
2018 2019 2020 2021 2022 2023

We are proud of the fact that finders from reports. Working with our platform
across the world have taken an interest provider (HackerOne) we have seen the
in the security and resilience of the UK majority of finders who submit reports
government and submitted vulnerability originate from outside of the UK.

The vulnerabilities
Path traversal 7% Improper access control 5%
Privilege escalation 5%
Open redirect 10%
Code injection 4%
Information exposure
through directory
listing 3%
Information disclosure 21%

Cross-site scripting
(Generic) 3%
Cross-site scripting
(reflected) 40% SQL injection 3%

The Vulnerability Reporting Service However, a consistent mitigation of a


data shows that the majority of the large percentage of vulnerabilities is to
vulnerabilities reported are cross-site ensure system owners are running the
scripting. The second most common latest version of the software and any
relate to information disclosure, installed plug‑ins.
which is largely caused by content
management system (CMS) plug‑ins.

60
NCSC Annual Review 2023

The system owners


Reports by department type

Local 73%

Central 21%

Other 6%

System Owners broadly fall into and decision-making at a national


three categories: level, such as national regulatory
Local – Local government; providing bodies. Some central government
services at local level from county level, departments have their own
down to town or parish councils. It can vulnerability disclosure programme
also include local public services such (VDP) through the Disclosure for
as GP surgeries, and fire and police Government Scheme.
services. Other – E xceptions for significant but
Central – C entral government out-of-scope cases, such as CNI. ‘Other’
departments with overall governance will also include any spam reports.

Guidance
This year, our best-practice guidance As a reminder that some cyber threats
on cloud computing has scored well are evergreen, our phishing guidance
with NCSC stakeholders, aligning with an remains among our most popular
ever-increasing number of businesses content. We’re committed to keeping
adopting cloud computing. Since our content current, reflecting changes
ChatGPT secured global coverage earlier in threat and how to counter it.
this year and excitement around the
capabilities of AI has grown, the NCSC has
leveraged its technical knowledge into
practical guidance, to concentrate on the
real opportunities and potential risks for
the UK.

61
NCSC Annual Review 2023

Guidance

15 53
1.7 million
user visits

A total of 15 new or revamped pieces of Along with 53 blogs on a range of


guidance were published in 2023 topics, with over 1.7 million user visits

The most searched terms were:

‘password(s)’ 2,490 searches

‘phishing’ 2,004 searches

‘Cyber Aware’ 871 searches

Capability
 The NCSC and DCMS published the Code of Practice
for app store operators and developers. It will
encourage them to meet a minimum bar for security
and privacy.
 The NCSC hosted an international workshop virtually
and in Manchester, focusing on the security of
compressed machine learning models, particularly in
the context of embedded or edge devices.
 The NCSC provided support to AUKUS in establishing
best-practice security culture.
 The NCSC vulnerability management team responded
to significant vulnerabilities including those affecting
the MOVEit managed file transfer software and a
critical vulnerability affecting Fortinet devices.

7 https://www.gov.uk/government/publications/code-of-practice-for-app-store-operators-
and-app-developers/code-of-practice-for-app-store-operators-and-app-developers-new-
updated-version#implement-a-vulnerability-disclosure-process

62
prompt:
A photo realistic black and white
image of Alan Turing witnessing
artificial intelligence become a vivid
colourful reality in the background.

commentary:
To visualise AI in the present day we took inspiration from the past and wondered
what the great Alan Turing would think about the developments in AI since he
first proposed an experiment to define a standard for a machine to be called
“intelligent”, known as “ The Turing Test”, over 70 years ago.
A founding father of AI, who worked for the forerunner to GCHQ, Turing represents
the values that the NCSC strive to uphold to this day.
NCSC Annual Review 2023

Case study: The cyber security


of artificial intelligence
Over the last year, we have all witnessed While much of the debate around AI
the significant increase in interest around focuses on its broad existential risks, there
artificial intelligence (AI) – p articularly are many immediate security concerns
following the launch of ChatGPT. This which the rapid development of AI brings.
has been accompanied by many, often Alongside industry and international
dystopian, predictions about how AI will partners, we are working to provide clear
impact almost every aspect of our lives in guidance to understand and manage
the coming years. these risks. We must also remember that
While many people will have encountered while the risks of AI are significant, at its
some varieties of AI such as large core AI is a type of software, so while
language models (LLMs) like ChatGPT, many of the challenges it creates are
new, there are also many lessons that we
the field of AI is incredibly broad. As the
have learnt from previous generations of
UK’s national technical authority for cyber
cyber security practice that we can use to
security, the NCSC has been focused
secure this rapidly developing technology.
on understanding the cyber security
challenges and opportunities that AI AI also presents the cyber security sector
presents for many years. with significant opportunities to develop
new and innovative ways to defend
And as this exciting field of technology
ourselves against hostile actors. Over the
develops, we continue to conduct
coming years, the NCSC will continue to
research into AI to understand its
work collaboratively with industry and
vulnerabilities and keep track of how our
academia to maximise the benefits of AI
adversaries are seeking to exploit AI in an
to cyber security.
irresponsible and unethical manner for
their nefarious ends.

64
NCSC Annual Review 2023

Inaugural AI Safety Summit


The AI Safety Summit held at Bletchley Park in November
2023 brought together world leading AI nations,
organisations, civil society groups and experts for the first
time to discuss the global future of AI, including how to
tackle frontier AI risks and how to improve frontier AI safety.
The Summit placed great emphasis on the importance
on global collaboration, and the resulting Bletchley
Declaration on AI saw 28 countries, including the US and
China, as well as the EU agreeing to ensure that AI is
developed and deployed safely and responsibly, so AI’s
enormous potential can be harnessed for the benefit of
humanity.
This announcement was followed by agreement to support the development
of an independent and inclusive ‘State of the Science’ Report, led by the Turing
Award-winning scientist Yoshua Bengio. The major AI companies and several
countries also signed up to state-led testing of the next generation of frontier
AI models before they are released. This was in addition to the UK Government
launching the world’s first AI Safety Institute; a new global hub based in the UK
tasked with testing the safety of emerging types of AI.
The challenges posed by frontier AI were never going to be resolved during a
single summit, which is why participants committed to meet again in 6 months at
a mini virtual summit, hosted by the Republic of Korea, followed by an in-person
summit in France a year from now.

Cyber security challenges of AI


Cyber security of AI was a common thread running throughout the Summit
discussions, particularly when it came to managing the risks that may arise from
potential intentional misuse or unintended issues of control of frontier AI.
Frontier AI models hold enormous potential to power economic growth, drive
scientific progress and unlock wider public benefits, while also posing potential
security risks if not developed responsibly. That is why cyber security is such
an essential pre-condition for the safety of AI systems. It is required to ensure
resilience, privacy, fairness, reliability, and predictability.
NCSC CEO, Lindy Cameron, who attended the Summit alongside GCHQ Director,
Anne Keast-Butler, who also serves on the External Advisory Board for the AI Safety
Institute, and Jen Easterly, Director US Cybersecurity & Infrastructure Security
Agency (CISA), reiterated her long held support for a ‘secure by design’ approach,
where security is integral to the development of AI systems from the outset, and
throughout the lifecycle.

65
NCSC Annual Review 2023

Need for AI to be ‘secure by design’ and firmware, software, and applications,


built on secure foundations which may hold outdated security
One of the biggest challenges around the protocols.
cyber security of AI is one that is common AI security must therefore apply across
to any technology: ensuring that it is this integration of technology stacks to be
‘secure by design’ and built on secure not only ‘secure by design’, but also built
foundations. on secure foundations and to consider
As AI becomes more prevalent across the security across the whole lifecycle of
technology ecosystem – a nd increasingly the technology. It requires organisations
incorporated into critical systems – we seeking to implement AI technology
need to ensure that these systems are within their systems to consider the
being designed and deployed securely to system as a whole – i ncluding the
avoid harm to individuals and systems, underlying infrastructure and supply
for example putting personal safety or chains – a nd not just the AI component.
data at risk. This requires security to be made a
business priority within the supply chain
We must remember lessons from the
of emerging technology, rather than
early days of the internet. In the 1990s,
simply a technical feature.
new technology was rapidly rolled out
– the world wide web, web browsers, the Machine learning risks
first search engines, text messages – Most applications of AI are built using
with very limited focus on security machine learning (ML) techniques. ML
considerations. And we continue to pay enables a system to ‘learn’ for itself about
the price, for example with the presence how to derive information from data,
of vulnerabilities in core email and web with minimal supervision from a human
protocols that were not secure by design. developer. But the use of ML creates its
As AI technologies are rolled out, there are own risks.
several significant risks that may make our Training AI using most ML algorithms
technology ecosystem more vulnerable. requires huge volumes of data, but there
First, if security is only a secondary is no inherent mechanism for filtering out
concern in the development of AI bad, inaccurate, or toxic data. Therefore
systems, we risk vulnerabilities being biases, inaccuracy and misinformation
designed into new systems. can be intentionally, or unintentionally,
built into AI with poor training or poor
Second, AI will require the development
data. And even if it is wrong, AI can still
and innovation of existing technology
appear extremely convincing.
stacks. This development is likely to
exacerbate existing vulnerabilities within As a result of this vulnerability in
these tech stacks and introduce new ML‑trained AI, a new category of attack
ones. And just as supply chain security is has been introduced that we need to
vital in current technology, it will remain counter: adversarial attacks.
incredibly important as AI is integrated In simple terms, adversarial attacks are
into technology stacks. an attempt to trick ML algorithms to
Thirdly, it is likely that as AI is incorporated influence the outcome of the AI. There
into existing IT functions, it could be are several methods of adversarial
integrated into legacy hardware, attack, including data poisoning

66
NCSC Annual Review 2023

attacks, where the attacker attempts this sector in a way that is diverse and
to contaminate the data used in the ML inclusive. We also need to ensure that
process. where AI is used to enhance cyber
security that we are doing all we can
Cyber security opportunities of AI
as a community to avoid introducing
While there is significant focus on the risks and reinforcing bias into cyber security
of AI, we must also ensure that we take analysis and threat monitoring. That is
advantage of the significant opportunities why the NCSC is working closely with the
that AI brings to cyber defenders. Alan Turing Institute to both help develop
Already, AI is already being used to and benefit from research on AI and
detect known types of fraud, through the cyber security across a range of topics.
detection of anomalies in user actions.
Challenges around the
In consumer banking, this can be applied
fundamentals of AI
to improved monitoring of card usage,
more quickly blocking fraudsters from As we have already highlighted, AI
using another user’s credit card by models have new, inherent weaknesses
identifying strange individual transactions. and vulnerabilities – which need to be
AI will be able to improve detection and understood by those developing them.
triage of cyber attacks. As AI detects Some cutting-edge AI models can be
patterns and relationships between data, it incredibly complex – often even their
can be used to recognise malicious emails creators don’t fully understand exactly
and cluster them to identify phishing how they work or what happens inside the
campaigns, which are then more easily model. This lack of ‘explain-ability’ is one
mitigated. of the key safety and security challenges.

It can be used to support cyber Another central challenge is around the


defenders, with analysis of logs and files, security and confidentiality of users’
network traffic, supporting secure code data. The fundamental operation of AI
development and testing, and threat systems relies on continued access to
intelligence. LLMs, in particular, are proving large, representative and often sensitive
to be beneficial in finding vulnerabilities datasets – this goes against normal
in source code and potentially spotting – cyber security approaches of restricting
and even fixing – flaws before attackers access to sensitive systems and
get the chance to exploit them. AI is components.
incredibly quick, so could be used to pick Some of the risks that flow from this are
up on potential attacks more rapidly if straightforward; for example, through
a vulnerability is exploited, speeding up either malicious activity or accidents,
the process of finding and fixing security confidential information could be leaked.
vulnerabilities, and making malware But there are other data risks; for example,
analysis more efficient. Over time, it is AI models can allow adversaries to
likely we will see AI providing a generation reconstruct the data they were trained on
of more secure code through faster through querying the models. It’s not only
learning. the integrity of the output or what it can
However, not all of these cyber security do that is important; the data and models
improvements will come automatically. of the AI are valuable assets in and of
We need to foster a community that themselves and should be appropriately
encompasses the entire cyber security protected.
ecosystem and focuses on growing
67
NCSC Annual Review 2023

Use of AI by hostile adversaries How the NCSC is maximising the


AI has the potential to dramatically benefits of AI
change the scale of the cyber security As the UK’s national technical authority
challenge that we face. Hostile for cyber security, the NCSC’s role is
adversaries are already using LLMs to understand and promote the cyber
to develop increasingly sophisticated security of AI technologies, working with
phishing emails and scams. government, academia and industry.
In the coming years, AI could be used to The NCSC has published, and will
conduct targeted or untargeted cyber continue to publish, guidance to support
attacks and it is also likely to lead to the a range of different groups – from cyber
further proliferation of cyber capability security professionals to business leaders
to a wider range of actors. Generative AI – as they seek to understand and realise
also has the potential to create synthetic the benefits that AI offers.
cyber environments which could be used A number of alumni companies from the
for criminal purposes or fraud. NCSC for Startups programme are using
Risks to organisations using AI AI in a variety of ways. Meterian uses AI to
As the opportunities of AI become boost its speed and comprehensiveness
more obvious, an increasing number of of indexing open source vulnerabilities
organisations are seeking to use it. It is to give enterprises the best visibility and
vital that as they develop AI capabilities auto-remediation of open source supply
they understand the heightened and chain risks when using programming
novel risks that they are running by doing languages as old as Perl, C/C++ o r the
next generation language Rust. Lexverify
it – and how best to mitigate them.
uses AI (advanced NLP) for real-time
The NCSC has already provided guidance prevention of legal, compliance, and
to organisations seeking to integrate cyber risks on electronic communications,
LLMs into their business operations. and Visible uses AI-generated reports to
Our understanding of the capabilities, provide highly detailed insight into how
weaknesses and vulnerabilities of LLMs individuals are perceived online.
will continue to develop as use cases and
The NCSC itself is also seeking to make
applications of the technology increases.
use of AI as part of our mission to keep
As a result, organisations should make
the UK the safest place to live and work
sure they are comfortable with the ‘worst
online. We are currently using machine
case scenario’ of whatever the LLM
learning to spot complex patterns of
application is permitted to do.
activity across multiple ACD datasets.
For example, correlating events from our
protective DNS service with those from our
host-based logging capability to identify
hidden malicious behaviour. We are also
investigating new opportunities for ACD to
incorporate improved human-AI teaming,
as well as researching the potential for
autonomous capabilities in the future.

68
NCSC Annual Review 2023

In the near future, we plan to use AI to


more effectively spot mutated forms
of malware to enable the identification
and release of indicators of compromise
(IOCs) more quickly than traditional
software reverse engineering or code
matching allows. We also plan to identify
patterns in the use of commodity services
– like blockchain‑based DNS – u sed by
malware actors in order to flag potential
IOCs before they have even gone live.
Longer term, we plan to use the huge
volumes of data generated by the NCSC’s
ACD products and services to identify
obscure patterns of malicious behaviour
across the entire government technology
estate among other areas.

69
NCSC Annual Review 2023

Afterword
This year’s review demonstrates the sheer Our heartfelt thanks to all those
scale and breadth of the NCSC’s work to working inside and alongside the
inform, influence and equip audiences organisation, this year and every year.
with the tools, motivation and confidence Our sector‑leading whole of society
they need to live and work safely online in approach hinges on strong collaboration
the UK. with industry, businesses, government
2024 will bring considerable challenges departments and wider sector partners,
and more opportunities. As has been critical to the success of our collective
set out in this review, the protection of aim to ensure the UK is the safest place to
democratic processes will be a focus for live and work online.
the NCSC in the UK, as well as for global We can all be proud of our collective
partners, as key elections shape the teams’ achievements, ensuring the online
coming year. The NCSC is determined to security of individuals and organisations,
remain agile in its approach, to ensure and we remain united in our pledge to
the UK is competitive and proactive ensuring cyber security remains a top
aiming to sharpen its focus on emerging priority for the UK and around the world.
technologies, like artificial intelligence As NCSC CEO Lindy Cameron outlined
and quantum computing. We’ll prioritise in her Foreword, we must be focused
our collaboration with sector partners, on the future if we are to deliver a more
nationally and globally to reach our resilient UK.
organisational aims. And 2024 will
see CYBERUK move from Belfast to
Birmingham, building on our commitment
to ensure the NCSC’s presence and
guidance is felt across the UK.

71
To request the information in this
document in an alternative format
please email enquiries@ncsc.gov.uk
© Crown copyright 2023. Photographs
produced with permission f rom third parties.
NCSC information licensed for re-use
under Open Government Licence
(www.nationalarchives.gov.uk/doc/open-
government-licence).
Designed and created by Design102
hello@design102.co.uk

Follow us:

@NCSC

@cyberhq

National Cyber

Security Centre

You might also like