Guidance comes amid the Russia-Ukraine war and explores the likelihood of Russian products and services being used by the state to damage UK interests. Credit: LPETTET / Getty Images The technical director of the UK National Cyber Security Centre (NCSC) has urged UK organisations to reconsider the potential risks associated with “Russian-controlled” parts of their supply chain. The guidance comes from Ian Levy amid the Russia-Ukraine war and explores the likelihood of Russian commercial products and services being used by the Russian state to cause damage to UK interests.No evidence of Russian subordinance but threats remain“We have no evidence that the Russian state intends to suborn Russian commercial products and services to cause damage to UK interests, but the absence of evidence is not evidence of absence,” Levy wrote in a blog posting. “The war has proven many widely held beliefs wrong and the situation remains highly unpredictable. In our view, it would be prudent to plan for the possibility that this could happen. In times of such uncertainty, the best approach is to make sure your systems are as resilient as you can reasonably make them.”Russian law already contains legal obligations on companies to assist the Russian Federal Security Service (FSB) and the pressure to do so may increase in a time of war, he added. “We also have hacktivists on each side, further complicating matters, so the overall risk has materially changed.”Certain organisations at higher risk of Russian supply chain threatsCertain organisations using Russian-nexus products should reconsider the risk of Russian-controlled parts of their supply chain as part of their overall business risk management, Levy said. Specifically, these are businesses providing services to Ukraine, services related to critical infrastructure or doing work that could be seen as counter to the Russian state’s interests, he added. “If you are more likely to be a target for the Russian state because of what’s going on, then it would be prudent to consider your reliance on all types of Russian technology products or services,” Levy said. “If you use services that are provided out of Russia (including development and support services), then you should think about how you could insulate yourself from compromise or misuse of these services. This is true whether you contract directly with a Russian entity, or it just so happens that the people who work for a non-Russian company are located in Russia.”Regardless of whether you’re a likely target, ongoing global sanctions could mean that Russian technology services and support for products may have to be stopped at a moment’s notice. “This would bring a new set of risks. Enterprises should consider how such an event would affect their resilience and consider plans for mitigation.” Removing Russian products a balance of riskThe question of whether businesses should continue to use Russian products and services is a pertinent one, and UK organisations may choose to remove them proactively, wait until contracts expire, or do so in response to the geopolitical events. Alternatively, businesses may choose to live with the risk, Levy wrote. Whatever decisions are made, cybersecurity remains a balance of different risks. “Rushing to change a product that’s deeply embedded in your enterprise could end up causing the very damage you’re trying to prevent,” he warned.As for specific Russian products, Levy cited queries over the use of Kaspersky anti-virus – something that Germany’s BSI recently warned against over spying concerns. He said that it remains highly unlikely that individuals and most enterprises will be targeted by Russian cyberattacks regardless of whether they use Russian products and services. “However, you may need to move to a new AV product if Kaspersky itself becomes subject to sanctions, since the AV product would likely stop getting updates (and AV software is only effective if it’s updated regularly).”Ultimately, the conflict has changed the world order and the increased risk and uncertainty aren’t going away any time soon, he added. “The best thing to do is to make plans, ensure your systems are as resilient as practical and have good recovery plans,” Levy concluded. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe