The Rise of Hacktivism: Analyzing Trends in Cyber Attacks on Critical Infrastructure
Introduction
Hacktivism has evolved into a more formidable threat in recent years, particularly in 2025. Moving beyond traditional tactics such as DDoS attacks and website defacements, hacktivists have increasingly targeted critical infrastructure, employing ransomware attacks and customized tools. This shift marks a significant transformation in their methods and objectives, raising alarms for businesses and governments alike.
The Shift in Hacktivist Tactics
The evolution of hacktivist methods can be traced back to late 2024 when Z-Pentest began focusing on industrial control systems (ICS). This trend has not only continued but is expected to amplify in 2026. Hacktivist groups are no longer merely content with defacing websites; they are now delving into complex systems that control critical infrastructure, thereby raising public safety concerns.
Targeting Critical Systems
The most frequently targeted environments have included:
- Industrial Control Systems (ICS): These systems are fundamental to the operations of various industries, and their breach can cause widespread disruption.
- Operational Technology (OT): This includes hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events.
- Human-Machine Interfaces (HMI): Systems that allow for direct interaction with machinery are becoming increasingly at risk.
Moreover, web-based Supervisory Control and Data Acquisition (SCADA) systems, as well as Building Management Systems (BMS) and IoT devices, are also under threat, primarily due to insufficient security measures.
Geographic Focus of Attacks
In 2025, Europe emerged as the primary target for pro-Russian hacktivist groups. Countries such as Spain, Italy, the Czech Republic, France, Poland, and Ukraine witnessed a surge in hacktivist activities. This region has become a dramatic battleground for cyber threats, tying hacktivism directly to geopolitical conflicts.
The Intersection of Hacktivism and State Interests
A notable trend is the increasing alignment between hacktivist groups and state interests. For instance, when the operation known as “Eastwood” aimed to disrupt NoName057(16)’s DDoS infrastructure, the group was quick to rebound and resumed its attacks on Ukraine and NATO. This resilience highlights how hacktivists often function within environments that may have state sponsorship or support.
Evidence of State Sponsorship
U.S. indictments have shed light on the structured cooperation between hacktivist groups and Russian intelligence. Specific allegations pointed towards GRU-backed initiatives that fund and orchestrate hacktivist activities. Groups like Cyber Army of Russia Reborn (CARR) and Z-Pentest have been prominently linked to these state interests.
On the other hand, pro-Ukrainian hacktivist groups such as the BO Team have sought to disrupt Russian operations by launching cyber-attacks aimed at crippling Russian businesses and state structures. Notably, Cyber Partisans BY and Silent Crow successfully penetrated Aeroflot’s IT ecosystem, confirming the disruptive capability of hacktivist factions.
Surge in Hacktivist Activity
Hacktivist sightings soared by 51% in 2025, leaping from 700,000 in 2024 to approximately 1.06 million. The increase reflects a substantial shift in the operational focus of hacktivists, specifically targeting countries deeply involved in geopolitical conflicts, such as India, Ukraine, and Israel.
Industries Affected
The impact of hacktivist attacks extended across multiple sectors:
- Government & Law Enforcement
- Energy & Utilities
- Education
- IT
- Transportation & Logistics
- Manufacturing
Particularly vulnerable industries, including Agriculture, Hospitality, and Real Estate, also reported an uptick in cyber intrusion attempts.
Future Projections
Looking ahead to 2026, expectations indicate that hacktivists will continue to exploit exposed HMI/SCADA systems and conduct VNC takeovers. With the aid of public proof-of-concepts and automated scanning tools, the implications for critical sectors—like energy, water supply, transportation, and healthcare—could be severe.
Conclusion
Hacktivism is no longer a fringe threat; it has become a well-coordinated and strategic endeavor targeting critical infrastructure. As both hacktivists and state-sponsored actors continue to converge, understanding these dynamics will be crucial for enhancing cybersecurity measures and safeguarding essential services. Organizations must prioritize updating their defenses against this evolving landscape to mitigate the risks associated with such cyber threats.


