NCSC: COVID-19 vaccines were prime target for hackers in 2021
The GCHQ's cyber arm says 20% of cyber attacks this year targeted the health sector and key organisations involved in the vaccine rollout
The National Cyber Security Centre (NCSC) has said it played a crucial role in the COVID-19 vaccine delivery this year, intervening in a record number of cyber incidents and protecting key figures in the health sector.
That's according to findings in a new report released by GCHQ's cyber arm Wednesday morning. The NCSC handled 777 incidents this year, up from 723 in 2020, and 20% of these were attacks on the health sector and key organisations in the vaccine rollout.
Researchers at the University of Oxford were among those who received help from the NCSC this year. The team working on the Oxford/AstraZeneca vaccine called in cyber security experts after they were targeted with ransomware which had the potential to significantly disrupt the UK's pandemic response.
Elsewhere, other staff working in the health sector and on vaccine delivery were also protected by the NCSC's Protective Domain Name System service. The tool prevented staff from accessing malicious domains and blocked 4.4 billion potentially harmful interactions, it said.
The NCSC's Active Cyber Defence (ACD) programme eliminated 2.3 million cyber-enabled commodity campaigns including 442 phishing campaigns that used NHS branding and 80 mobile apps hosted outside of the usual, official app stores.
The ACD is a suite of free-to-use tools provided to organisations by the NCSC to protect against the most common cyber attacks that strike UK businesses and other organisations, rather than targeted attacks that require more bespoke attention.
"The growth in the number of incidents handled by the NCSC this year is partially reflected in the organisation’s ongoing work to proactively identify threats through the work of its Threat Operations and Assessment teams," said the NCSC.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The report also echoed other corners of the industry in saying ransomware detections have once again increased on the previous year
One of the differentiating factors of ransomware activity in 2021 was the growing real-world impact of ransomware attacks on businesses and other organisations, the NCSC said.
With the JBS Foods attack, food supplies were affected and the Colonial Pipeline hack saw local fuel prices increase. Consumers were unable to complete on property purchases due to the Simplify Group and Hackney Borough Council cyber attacks. The latter also saw entire communities locked out of public services in an incident that took months and millions of pounds to recover from.
RELATED RESOURCE
"We will work with the FCDO to put cyber power at the heart of the UK’s foreign policy agenda, strengthening our collective security, ensuring our international commercial competitive advantage and shaping the debate on the future of cyberspace and the internet," said Lindy Cameron, CEO at the NCSC.
"We will need to reinforce our core alliances and lead a compelling campaign aimed at middle-ground countries to build stronger coalitions for deterrence and counter the spread of digital authoritarianism," she added. "This will involve better connecting our overseas influence to our domestic strengths, leveraging our operational and strategic communications expertise, thought leadership, trading relationships and industrial partnerships as a force for good."
The NCSC also expressed an interest in ramping up collaborative efforts from international law enforcement agencies to target ransomware operators overseas, namely in Russia and China, following related talks at the G7 summit held in Cornwall earlier this year.
Double extortion ransomware attacks which first rose to prominence in 2020, the NCSC said, are "almost certain to grow" next year with a high chance it will claim more victims in the UK.
Also expected to see an increase are supply chain attacks. Given the critical nature of the targets, attackers are highly likely to target this area again, the NCSC said, adding that successful compromises can lead to a highly effective campaign thanks to the global reach of supply chains.
“This year we have seen countless examples of cyber security threats: from state-sponsored activity to criminal ransomware attacks. It all serves to remind us that what happens online doesn’t stay online – there are real consequences of virtual activity," said Jeremy Fleming, director at GCHQ.
“In the face of rising cyber attacks and an evolving threat, this year’s NCSC’s Annual Review shows that world-class cyber security, enabled by the expertise of the NCSC as part of GCHQ, continues to be vital to the UK’s safety and prosperity.”

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
How the UK is leading Europe at AI-driven manufacturingIn-depth A new report puts the country on top of the charts in adopting machine learning on the factory floor in several critical measures
-
US data center power demand forecast to hit 106GW by 2035, report warnsNews BloombergNEF research reveals a sharp 36% jump in energy forecasts as "hyperscale" projects reshape the American grid
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
-
The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible'News Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world
-
A notorious ransomware group is spreading fake Microsoft Teams ads to snare victimsNews The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities
-
Volkswagen confirms security ‘incident’ amid ransomware breach claimsNews Volkswagen has confirmed a security "incident" has occurred, but insists no IT systems have been compromised.
-
The number of ransomware groups rockets as new, smaller players emergeNews The good news is that the number of victims remains steady
-
Teens arrested over nursery chain Kido hacknews The ransom attack caused widespread shock when the hackers published children's personal data