Europe Faces Surge in Hacktivist Cyberattacks, Report Highlights

Europe is witnessing a surge in politically motivated hacktivist cyberattacks, as revealed by Orange Cyberdefense's Security Navigator 2025. The report highlights the rise of cognitive warfare, the targeting of critical infrastructure, and the dual role of AI in cybersecurity. Learn why proactive measures and education are vital to counter these growing threats.
Security

Europe Emerges as Prime Target for Hacktivists, Orange Cyberdefense Report Reveals

Orange Cyberdefense, the cybersecurity division of the Orange Group, has released its annual Security Navigator 2025 report. The publication, now in its sixth edition, provides critical insights into the evolving cyber threat landscape. This year’s findings spotlight the sharp rise in politically motivated cyberattacks targeting Europe, a trend intensifying since the Russian invasion of Ukraine in 2022.

Rising Hacktivist Threat: Politically Motivated Cyberattacks in Europe


At a recent event in London, Char van der Walt, Head of Security Research at Orange Cyberdefense, and Sara Puigvert, EVP of Global Operations, emphasized the growing threat of hacktivist activity in Europe.

A hacktivist, defined as a politically motivated hacker operating independently of state sponsorship, has become a significant player in cyber warfare. According to the report, one unnamed pro-Russian hacktivist group has carried out over 6,600 cyberattacks since 2022, with 96% of these targeting European nations such as Ukraine, Poland, Spain, Italy, and the Czech Republic.

Cognitive Warfare: Hacktivists Shift Focus to Public Trust

Hacktivists are increasingly engaging in “cognitive warfare,” where the goal is to manipulate public perception and trust rather than merely cause technical disruptions. While not directly state-sponsored, many of these groups are “government-tolerated,” operating under the umbrella of a broader geopolitical strategy. According to van der Walt, their activities often echo Russiaโ€™s playbook of societal disruption, aiming to portray the West, NATO, and Ukraine’s allies as morally corrupt.

These attacks frequently focus on symbolic institutions, such as election systems, to spread disinformation and foster societal disharmony. Events like European elections, political protests, or pivotal moments in the Ukraine conflict often serve as triggers for such cyber campaigns.

Hacktivists Target Europeโ€™s Critical Infrastructure Systems

Hacktivist activity is no longer confined to traditional IT systems. Nearly 23% of operational technology (OT) cyberattacks in 2024 were linked to hacktivist groups. These attacks often targeted critical infrastructure sectors, such as utilities, energy, manufacturing, and healthcare. Among these incidents, 46% resulted in the manipulation of control processes, highlighting the vulnerability of essential infrastructure.

This shift towards targeting OT systems amplifies the risks to sectors critical for societal functioning. The energy and manufacturing sectors remain particularly exposed, underscoring the importance of robust cybersecurity measures.

AIโ€™s Role in Cybersecurity: Opportunities and Threats

Artificial intelligence (AI) is playing an increasingly significant role in the cybersecurity landscape. Threat actors are leveraging generative AI (GenAI) to craft highly sophisticated phishing attacks and deepfakes, making them harder to detect. Conversely, cybersecurity teams are deploying AI-powered tools to improve threat detection and response times.

However, the Security Navigator 2025 report also warns of vulnerabilities within GenAI systems, which could be exploited by adversaries. This dual-edged role of AI emphasizes the need for continuous innovation in cybersecurity to stay ahead of emerging threats.

Building Cyber Resilience Through Education and Community Tools

To enhance awareness and resilience, Orange Cyberdefense has introduced the Cybercrime Now tool, a free, interactive platform designed to educate users about the criminal ecosystem surrounding hacktivists. This tool offers valuable insights into how these groups operate, empowering organizations and individuals to strengthen their defenses.

Exploring Cybersecurity Solutions at Submarine Networks EMEA 2025

The conversation on cybersecurity continues at the Submarine Networks EMEA event, scheduled for February 18-19, 2025, in London. Attendees will explore the latest trends and solutions in cybersecurity and network resilience.

Conclusion

The findings of Orange Cyberdefenseโ€™s Security Navigator 2025 underscore the urgent need for European countries to address the rising threat of politically motivated cyberattacks. As hacktivists evolve their tactics, focusing on cognitive warfare and critical infrastructure, organizations must adopt a proactive approach, leveraging AI, advanced threat detection, and community education tools. Collaborative efforts will be essential to safeguarding public trust and protecting vital infrastructure against this growing menace.


Recent Content

Legacy broadband networks are struggling to meet todayโ€™s demands. Open architectures โ€” modular, interoperable, and standards-based โ€” are revolutionizing broadband by promoting flexibility, cost-efficiency, and faster innovation. Learn how service providers can leverage open broadband strategies to scale, improve customer experiences, and build resilient, future-proof infrastructures ready for the digital economy.
As networks grow more complex, traditional management models fall short. This article explores how AIOps (Artificial Intelligence for IT Operations) enables autonomous networks that self-configure, self-optimize, and self-heal. Learn how service providers can use AIOps frameworks to achieve predictive maintenance, dynamic resource management, enhanced customer experiences, and operational scalability to thrive in the era of 5G, IoT, and beyond.
Batelco by Beyon and Nokia are partnering to launch Bahrainโ€™s first private 5G network at Aluminum Bahrain (Alba). The network will drive smart manufacturing through real-time monitoring, automation, and AI-driven analyticsโ€”paving the way for Albaโ€™s digital transformation and advancing Bahrainโ€™s Industry 4.0 strategy.
Indian telecom companies such as Jio and Airtel are moving beyond internal AI use cases to co-develop monetizable, India-focused AI applications in partnership with tech giants like Google, Nvidia, Cisco, and AMD. These collaborations are enabling sector-specific AI tools across healthcare, education, and agriculture, boosting operational efficiency, customer experience, and creating new revenue streams for telecom operators.
ETSI has published its first ISAC report for 6Gโ€”ETSI GR ISC 001โ€”highlighting 18 use cases across healthcare, public safety, automation, and mobility. The report dives into deployment scenarios, sensing modalities, and KPIs like fine motion accuracy and sensing latency. It also outlines security, privacy, and sustainability guidelines for real-world ISAC integration into 6G networks.
In 2025, 5G surpasses 2.25 billion global connections, marking a pivotal shift toward mainstream adoption. While North America leads in performance and per capita usage, challenges in spectrum policy and enterprise integration remain. This in-depth report from 5G Americas explores the rise of Standalone 5G, the promise of 5G-Advanced, the reality of private network deployments, and the need for smart, forward-looking spectrum strategy.
Whitepaper
Explore the Private Network Edition of 5G Magazine, your guide to the latest in private 5G/LTE and CBRS networks. This edition spotlights 11 award categories including private 5G/LTE leader, neutral host leader, and rising startups. It features insights from industry leaders like Jason Wallin of John Deere and an analysis...
Whitepaper
Discover the potential of mobile networks in modern warfare through our extensive whitepaper. Dive into its strategic significance, understand its security risks, and gain insights on optimizing mobile networks in critical situations. An essential guide for defense planners and cybersecurity enthusiasts....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top