The head of the UK National Cyber Security Centre (NCSC) Lindy Cameron has given an update on Russia\u2019s cyber activity amid its war with Ukraine. Her speech at Chatham House today comes just a few days after Ukraine\u2019s military intelligence agency issued a warning that Russia was \u201cpreparing massive cyberattacks on the critical infrastructure of Ukraine and its allies.\u201d This coincides with a new Forrester report that reveals the extent to which the cyber impact of the Russia-Ukraine conflict has expanded beyond the conflict zone with malware attacks propagating into European entities.UK NCSC CEO urges UK businesses to prepare for elevated alertAddressing Russian cyber activity this year, Cameron stated that, while we have not seen the \u201ccyber-Armageddon\u201d some predicted, there has been a \u201cvery significant conflict in cyberspace \u2013 probably the most sustained and intensive cyber campaign on record \u2013 with the Russian State launching a series of major cyberattacks in support of their illegal invasion in February.\u201dRussian cyber forces from their intelligence and military branches have been busy launching a huge number of attacks in support of immediate military objectives. Their actions suggest a clear rationale to reduce the Ukrainian government\u2019s ability to communicate with its population, impact the Ukrainian financial system at a time of heightened concern, and divert Ukrainian cybersecurity resource from their other priorities, Cameron added. \u201cOne specific observation is that Russia has favored wiper malware. Much like ransomware, this encrypts a device, making its data inaccessible. But, unlike ransomware, the effect is not designed to be undone. Thus, the infected device is rendered useless,\u201d she continued.Since the start of the year, the NCSC has been advising UK organizations to take a more proactive approach to cybersecurity in light of the situation in Ukraine. \u201cThere may be organizations that are beginning to think \u2018is this still necessary?\u2019 as in the UK we haven\u2019t experienced a major incident related to the war in Ukraine. My answer is an emphatic yes,\u201d Cameron said.In response to significant recent battlefield set-backs, Putin has been reacting in unpredictable ways, and so we shouldn\u2019t assume that just because the conflict has played out in one way to date, it will continue to go the same way, Cameron added. \u201cThere is still a real possibility that Russia could change its approach in the cyber domain and take more risks \u2013 which could cause more significant impacts in the UK.\u201d UK organizations and their network defenders should therefore be prepared for this period of elevated alert with a focus on building long-term resilience, which is a \u201cmarathon not a sprint,\u201d she said.Ukraine warns allies of \u201cmassive\u201d Russian cyberattacksIn an article published on September 26, Ukrainian intelligence agencies stated that the Kremlin is planning to carry out massive cyberattacks on the critical infrastructure facilities of Ukrainian enterprises and critical infrastructure institutions of Ukraine\u2019s allies. \u201cFirst of all, the blow will be directed to the enterprises of the energy industry. During the operations, the experience of cyberattacks on the energy systems of Ukraine in 2015 and 2016 will be used,\u201d the warning read. \u201cBy this, the enemy will try to enhance the effect of missile strikes on power supply facilities, primarily in the eastern and southern regions of Ukraine. The command of the occupiers is convinced that this will lead to a slowdown in the offensive actions of the Ukrainian Defense Forces.\u201dAccording to the warning, the Kremlin also intends to increase the intensity of DDoS attacks on the critical infrastructure of Ukraine\u2019s closest allies, especially Poland and the Baltic states.Cyber impact of Russia-Ukraine war expanding beyond the conflict zoneA new report from Forrester has revealed the extent to which the cyber impact of the Russia-Ukraine conflict has expanded beyond the conflict zone. In European Cybersecurity Threats, 2022, Forrester experts stated that destructive Russian malware attacks are propagating into European entities, who should stay prepared for cyber retaliation and an escalation of espionage campaigns.\u201cRussian hackers use advanced persistent threats (APTs) and sensitive data infiltration to gain advantage. About a quarter of total investigated intrusion attacks were identified as successful, and Russian adversaries exfiltrated strategic information, but this number might be underestimating the Russian threat,\u201d the report read.