top of page
Search

ENISA Threat Landscape 2025 — Part 4:

  • Writer: Katarzyna  Celińska
    Katarzyna Celińska
  • Oct 28
  • 2 min read

 

The 2025 edition of European Union Agency for Cybersecurity (ENISA) Report dives deep into how disinformation and hacktivism have evolved into coordinated, state-linked instruments of influence and disruption across Europe.

 

INFORMATION MANIPULATION

➡️ 86 documented FIMI operations targeted EU institutions and Member States.

➡️ 60.5% of these were attributed to known information manipulation sets — coordinated influence groups combining fake accounts, media portals, and automated bots.

➡️ Russian groups focused heavily on EU elections, political summits, and crisis events, exploiting breaking news and social unrest to maximize visibility.

 

ree

Manipulation Tactics:

1️⃣ Fakenews ecosystems — building entire networks of imitation media outlets with credible-looking names.

2️⃣ Synthetic personas — fake journalists or analysts used to seed divisive content.

3️⃣ AI-generated content — deepfake videos, forged statements, and synthetic “quotes” attributed to EU leaders.

4️⃣ Cross-platform amplification — coordinated posting across Telegram, X, and fringe forums to simulate organic engagement.

 

ENISA notes that roughly 25% of FIMI narratives explicitly sought to degrade the image of the EU, spreading stories that questioned European unity and crisis response capability.

 

HACKTIVISM

➡️ Hacktivism, though often technically unsophisticated, remains one of the most active and visible threats across the EU.

➡️ ENISA recorded hacktivist claims in 79% of total incidents during the reporting period — a dramatic rise fueled by geopolitical polarization.

➡️ 91.5% of hacktivist attacks were DDoS campaigns targeting websites of government institutions, parliaments, and ministries.

➡️ Intrusions accounted for 5.1%, and data breaches for only 3.4%, showing that while visibility is high, the actual damage is limited.

➡️ Pro-Russia hacktivist alliances dominate, but ENISA also notes rising pro-Palestine and anti-Western coalitions, many sharing infrastructure or coordination channels.

➡️ The lines between hacktivism, hasztag#cybercrime, and state operations are increasingly blurred.

 

From the Polish perspective, these findings are extremely relevant. Russia continues to weaponize information to destabilize public opinion, manipulate narratives, and create chaos — particularly in countries like Poland that stand on the geopolitical front line. Hacktivism is growing, often supported by state actors or cybercrime alliances, creating a hybrid form of ideological and technical warfare. DDoS attacks are the most common, but the most damaging attacks are those targeting government systems and critical infrastructure, including OT.



 
 
 

Comments


Stay in touch

BW ADVISORY sp. z o.o. 

ul. Boczańska 25
03-156 Warszawa
NIP: 525-281-83-52

Privacy policy

  • LinkedIn
  • Youtube
bottom of page