Fortifying the UK’s energy sector: The cybersecurity imperative in an AI-driven future


The government’s push to “mainline AI into the veins” of the nation marks a transformative era. However, the very foundation of this progress – the energy grid – has become a lucrative target for malicious actors. AI-driven technologies promise greater efficiency and resilience, yet their dependence on the UK’s energy sector puts a bigger target on the country’s critical infrastructure. As the UK advances toward making its mark as a global AI leader, its energy sector faces a critical challenge of the rising threat of cyberattacks.
With national security and technological leadership at stake, energy providers must urgently fortify their defenses to safeguard the UK’s AI ambitions from disruption.
Vice President of Consulting and Professional Services for EMEA at Trustwave.
The growing cyber threat against legacy systems
According to Trustwave’s latest report, the average cost of a data breach in the energy sector stands at a staggering $5.29 million, significantly exceeding the cross-industry average of $4.8 million. The financial toll is just the tip of the iceberg; a successful cyber-attack against the UK’s energy sector could lead to far more severe consequences such as operational disruptions, national security risks, and a loss of public trust. Given the centrality of the energy sector to AI-powered progress, any interference could derail the UK’s momentum towards technological leadership.
One of the more significant challenges is the sector’s reliance on ageing infrastructure and legacy systems. Thames Water highlighted in 2024 that some IT systems date back to the 1980s, leaving them highly vulnerable. Outdated systems also hinder compatibility with modern security solutions, essential for protecting against cyber threats without disrupting operations.
Moreover, the sector is integrating its physical infrastructure with digital systems like Supervisory Control and Data Acquisition (SCADA) and IoT. While this enhances efficiency, increasing digital transformation also expands the risk of cyberattacks. This integration exposes vulnerabilities and complicates securing both operational technology (OT) and IT infrastructures. Securing OT systems requires specialized cybersecurity approaches due to their proprietary nature and direct impact on physical infrastructure. Balancing security with operational reliability is crucial, as using traditional IT security methods could leave energy organizations on the back foot.
Finally, energy companies face significant challenges in overhauling aging infrastructure due to costs and operational risks. Connecting legacy systems to modern networks or IoT devices could pose further security risks without appropriate and proactive cyber hygiene measures. Protecting these systems while transitioning to more secure technologies demands strategic planning, investment, and collaboration between IT and OT teams.
Ransomware on the horizon
When it comes to cybersecurity, IT or OT infrastructure is unfortunately not the only concern that the energy and utility sector needs to be aware of. Especially since the UK’s ambition for AI leadership has further raised the critical importance of the energy and utilities sector in the UK, it has become that much more of a lucrative target for cybercriminals and nation-state hackers to disrupt essential services and cause further financial, economic and community damage.
There has been a significant increase in ransomware attacks targeting the energy and utilities sector, with an 80% year-over-year increase globally. The number of attacks was notably higher in the second half of 2023 and the first half of 2024. This increase in the number of ransomware attacks can be linked to the rise in Ransomware-as-a Service (RaaS) groups, which has enabled less-skilled attackers to carry out highly-sophisticated ransomware campaigns. Additionally, as ransomware groups refine their tactics, they become more effective at exploiting weak links within the sector, increasing the chances of widespread disruption and financial loss.
A pressing concern is the sector’s supply chain weaknesses. Ransomware groups frequently target suppliers and service providers, who often have privileged access to critical systems but lack the same level of security controls as energy companies themselves. A single compromised supplier can serve as an entry point, allowing attackers to infiltrate multiple clients and escalate their impact across the industry.
Compounding this challenge is a fundamental lack of visibility within energy organizations. Many struggle to maintain an accurate inventory of their assets, track their access levels, and understand interconnections between systems. This opacity leads to security blind spots, making it easier for ransomware groups to exploit overlooked vulnerabilities and move laterally within networks undetected.
Remote services further expand the attack surface, providing cybercriminals with a pathway into critical systems. Attackers frequently exploit remote access tools such as SMB/Windows Admin Shares and Remote Desktop Protocol (RDP) to gain persistence within a network. Without stringent access controls and monitoring, these services can serve as a gateway for ransomware deployment and data exfiltration.
Building cyber resilience in the energy sector
Addressing the challenge of legacy systems in the energy and utilities sector, many of which were not designed to withstand modern cyber threats, requires energy companies to implement virtual patching for unpatched systems, strict access controls, and network segmentation to isolate vulnerable assets. A phased approach to infrastructure modernization, coupled with secure OT-IT integration is an additional critical requirement as this allows energy companies to upgrade systems while maintaining operational stability.
Zero-trust security frameworks need to be established as these require continuous verification of all users and devices. Such a framework further reduces risks associated with interconnected IT and OT environments. Furthermore, investing in specialized OT cybersecurity measures, including intrusion detection systems (IDS) tailored to industrial environments, ensures that security efforts do not disrupt critical operations.
Operational stability and resilience is, of course, especially critical for energy and utilities providers given the profound impact to businesses and communities that an operational halt could have. For instance, our research report found that an attack on one such facility that houses 400 million cubic meters of gas, could leave London (8.87 million people) without gas for over two weeks (14.6 days).
Energy and utility providers must begin to prioritize bolstering resilience through the use of proactive threat intelligence, dark web monitoring, and incident response planning to prepare for and respond to emerging threats. Strengthening supply chain security, enforcing multi-factor authentication (MFA), and ensuring regulatory compliance are supplementary steps in a robust defense against cyber adversaries.
The path forward
Ultimately, as the UK pushes forward with its AI ambitions, the energy sector must remain vigilant against the escalating cyber threats that could hinder this progress. AI’s transformative potential hinges on a stable and secure energy infrastructure—without it, the nation’s leadership in AI and digital innovation is cut off at its knees.
By prioritizing modernized security frameworks, proactive threat intelligence, and comprehensive incident response planning, the UK can safeguard its critical infrastructure from cybercriminals seeking to exploit its digital evolution. A secure energy sector is not just an operational necessity; it is the backbone of the country’s AI-driven future. Only through decisive action and strategic investment in cybersecurity can the UK ensure that its pursuit of technological leadership remains uninterrupted.
We’ve featured the best encryption software.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The government’s push to “mainline AI into the veins” of the nation marks a transformative era. However, the very foundation of this progress – the energy grid – has become a lucrative target for malicious actors. AI-driven technologies promise greater efficiency and resilience, yet their dependence on the UK’s energy…
Recent Posts
- Fortifying the UK’s energy sector: The cybersecurity imperative in an AI-driven future
- Microsoft discovers five potentially damaging attacks against its own software
- ‘Clair Obscur: Expedition 33’ preview: Stunning visuals, innovative combat, prime melodrama
- US government cuts key software division without warning
- Tonal 2 Review: Smarter Strength Training
Archives
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010