Webinar: Cyber Threat and Resilience Intelligence Briefing Series – Defence

February 24, 2026|Not specified|Past event

State-sponsored hackers are now directly targeting employees in the UK defence supply chain through personalised cyber-espionage, amplifying risks to national security amid escalating geopolitical tensions.

Key takeaways

  • In early 2026, Google reported a surge in state-linked campaigns spoofing defence contractors across Europe including the UK, shifting from broad infrastructure hits to individual employee targeting via hiring processes.
  • The UK defence sector faces mounting pressure from recent high-impact incidents and a 2025 Strategic Defence Review that integrates cyber as a core warfighting domain, with new structures like CyberEM Command set for implementation.
  • Failure to bolster resilience risks supply chain compromises that could delay military capabilities or expose sensitive data, at a time when AI lowers barriers for adversaries and economic damages from similar attacks reached £1.9 billion in one 2025 case.

Escalating Cyber Risks to UK Defence

The UK's defence industrial base confronts a rapidly intensifying cyber threat environment as state actors exploit vulnerabilities in supply chains and personnel. Recent intelligence highlights how adversaries, including those linked to Russia and China, have expanded targeting to include spoofed websites of hundreds of defence firms and direct approaches to employees during recruitment. This evolution makes espionage more accessible and harder to detect, particularly as AI tools reduce the expertise needed to mount sophisticated operations.

Geopolitical pressures drive this focus: the 2025 Strategic Defence Review positioned cyber alongside traditional domains, establishing a CyberEM Command for integrated offensive and defensive operations while accelerating digital targeting capabilities by 2027. Concurrently, the government advanced a Cyber Action Plan with £210 million funding and proposed a Cyber Security and Resilience Bill to expand oversight of critical sectors. These moves respond to persistent incidents, including breaches at Ministry of Defence contractors that exposed sensitive military site data.

The stakes extend beyond immediate data loss. Compromised defence suppliers can disrupt production timelines for weapons systems, erode technological edges, and impose substantial economic costs—exemplified by a 2025 attack on a major manufacturer causing £1.9 billion in UK-wide damages. Smaller firms in the supply chain remain particularly vulnerable, often lacking resources to counter advanced persistent threats, creating cascading risks for larger primes and national capabilities.

Tensions arise between rapid innovation and security: the push for digital transformation and AI integration in defence systems introduces new attack surfaces, while reliance on global supply chains exposes dependencies that adversaries can exploit. Balancing collaboration with international partners against the need for sovereign resilience adds complexity, as does the skills shortage in cyber expertise across government and industry.

We use cookies to measure site usage. Privacy Policy