Europe Faces Surge in Hacktivist Cyberattacks, Report Highlights

Europe is witnessing a surge in politically motivated hacktivist cyberattacks, as revealed by Orange Cyberdefense's Security Navigator 2025. The report highlights the rise of cognitive warfare, the targeting of critical infrastructure, and the dual role of AI in cybersecurity. Learn why proactive measures and education are vital to counter these growing threats.
Security

Europe Emerges as Prime Target for Hacktivists, Orange Cyberdefense Report Reveals

Orange Cyberdefense, the cybersecurity division of the Orange Group, has released its annual Security Navigator 2025 report. The publication, now in its sixth edition, provides critical insights into the evolving cyber threat landscape. This year’s findings spotlight the sharp rise in politically motivated cyberattacks targeting Europe, a trend intensifying since the Russian invasion of Ukraine in 2022.

Rising Hacktivist Threat: Politically Motivated Cyberattacks in Europe


At a recent event in London, Char van der Walt, Head of Security Research at Orange Cyberdefense, and Sara Puigvert, EVP of Global Operations, emphasized the growing threat of hacktivist activity in Europe.

A hacktivist, defined as a politically motivated hacker operating independently of state sponsorship, has become a significant player in cyber warfare. According to the report, one unnamed pro-Russian hacktivist group has carried out over 6,600 cyberattacks since 2022, with 96% of these targeting European nations such as Ukraine, Poland, Spain, Italy, and the Czech Republic.

Cognitive Warfare: Hacktivists Shift Focus to Public Trust

Hacktivists are increasingly engaging in “cognitive warfare,” where the goal is to manipulate public perception and trust rather than merely cause technical disruptions. While not directly state-sponsored, many of these groups are “government-tolerated,” operating under the umbrella of a broader geopolitical strategy. According to van der Walt, their activities often echo Russia’s playbook of societal disruption, aiming to portray the West, NATO, and Ukraine’s allies as morally corrupt.

These attacks frequently focus on symbolic institutions, such as election systems, to spread disinformation and foster societal disharmony. Events like European elections, political protests, or pivotal moments in the Ukraine conflict often serve as triggers for such cyber campaigns.

Hacktivists Target Europe’s Critical Infrastructure Systems

Hacktivist activity is no longer confined to traditional IT systems. Nearly 23% of operational technology (OT) cyberattacks in 2024 were linked to hacktivist groups. These attacks often targeted critical infrastructure sectors, such as utilities, energy, manufacturing, and healthcare. Among these incidents, 46% resulted in the manipulation of control processes, highlighting the vulnerability of essential infrastructure.

This shift towards targeting OT systems amplifies the risks to sectors critical for societal functioning. The energy and manufacturing sectors remain particularly exposed, underscoring the importance of robust cybersecurity measures.

AI’s Role in Cybersecurity: Opportunities and Threats

Artificial intelligence (AI) is playing an increasingly significant role in the cybersecurity landscape. Threat actors are leveraging generative AI (GenAI) to craft highly sophisticated phishing attacks and deepfakes, making them harder to detect. Conversely, cybersecurity teams are deploying AI-powered tools to improve threat detection and response times.

However, the Security Navigator 2025 report also warns of vulnerabilities within GenAI systems, which could be exploited by adversaries. This dual-edged role of AI emphasizes the need for continuous innovation in cybersecurity to stay ahead of emerging threats.

Building Cyber Resilience Through Education and Community Tools

To enhance awareness and resilience, Orange Cyberdefense has introduced the Cybercrime Now tool, a free, interactive platform designed to educate users about the criminal ecosystem surrounding hacktivists. This tool offers valuable insights into how these groups operate, empowering organizations and individuals to strengthen their defenses.

Exploring Cybersecurity Solutions at Submarine Networks EMEA 2025

The conversation on cybersecurity continues at the Submarine Networks EMEA event, scheduled for February 18-19, 2025, in London. Attendees will explore the latest trends and solutions in cybersecurity and network resilience.

Conclusion

The findings of Orange Cyberdefense’s Security Navigator 2025 underscore the urgent need for European countries to address the rising threat of politically motivated cyberattacks. As hacktivists evolve their tactics, focusing on cognitive warfare and critical infrastructure, organizations must adopt a proactive approach, leveraging AI, advanced threat detection, and community education tools. Collaborative efforts will be essential to safeguarding public trust and protecting vital infrastructure against this growing menace.


Recent Content

At THINK 2025, IBM accelerates GenAI adoption with new enterprise-ready tools—from watsonx AI agents to secure LinuxONE infrastructure and hybrid cloud automation. The company’s latest updates aim to move businesses from GenAI pilots to full-scale deployments with enhanced integration, accuracy, and performance.
Vodafone is expanding its role in the UK smart metering upgrade by providing fixed-line connectivity between energy suppliers and the Data Service Platform (DSP). This move complements its existing mobile network role and positions Vodafone as a critical telecom partner in the UK’s digital energy transition, helping to advance national net-zero and smart grid goals.
AI agents are transforming enterprise operations, acting as autonomous digital coworkers that enhance productivity, reduce costs, and support strategic decision-making. With a projected 327% growth by 2027, enterprises must adopt AI agents to remain competitive in an AI-first economy.
Financial institutions are adopting artificial intelligence (AI) to navigate complex regulations, transforming compliance into a competitive advantage. AI’s ability to process vast amounts of data quickly is proving transformative in meeting these challenges, automating tasks and improving efficiency. This shift allows compliance professionals to focus on strategic initiatives while ensuring regulatory compliance.
The recent SK Telecom data breach, termed the industry’s worst by CEO Ryu Young-sang, led to a massive customer exodus and highlighted urgent cybersecurity needs. With 70,000 users lost, the telecom giant faces financial and legal challenges, emphasizing the critical role of robust data security measures.
Meta projects its generative AI technologies to generate substantial revenue, forecasting between $460 billion to $1.4 trillion by 2035. This growth is supported by strategic monetization and robust investments in AI development, despite facing significant legal and ethical challenges.
Whitepaper
Telecom networks are facing unprecedented complexity with 5G, IoT, and cloud services. Traditional service assurance methods are becoming obsolete, making AI-driven, real-time analytics essential for competitive advantage. This independent industry whitepaper explores how DPUs, GPUs, and Generative AI (GenAI) are enabling predictive automation, reducing operational costs, and improving service quality....
Whitepaper
Explore the collaboration between Purdue Research Foundation, Purdue University, Ericsson, and Saab at the Aviation Innovation Hub. Discover how private 5G networks, real-time analytics, and sustainable innovations are shaping the "Airport of the Future" for a smarter, safer, and greener aviation industry....
Article & Insights
This article explores the deployment of 5G NR Transparent Non-Terrestrial Networks (NTNs), detailing the architecture's advantages and challenges. It highlights how this "bent-pipe" NTN approach integrates ground-based gNodeB components with NGSO satellite constellations to expand global connectivity. Key challenges like moving beam management, interference mitigation, and latency are discussed, underscoring...

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top