Europe enters 2025 facing the most complex and consequential cyber threat environment in the continent’s history. The convergence of an unresolved ground war on Europe’s eastern border, intensifying geopolitical competition between NATO and both Russian and Chinese state interests, a historically aggressive regulatory implementation cycle, and a ransomware ecosystem that is increasingly treating European organizations as primary rather than secondary targets has produced a threat landscape without modern precedent. Dark Angel’s analysis of 2024 incident data across 27 EU member states, the United Kingdom, Norway, and Switzerland reveals a 31% year-over-year increase in confirmed cyber incidents affecting European entities, with state-sponsored espionage operations, financially motivated ransomware campaigns, and ideologically driven hacktivism operating simultaneously across the same target space. This report provides a strategic assessment of these converging threat vectors, their implications for European organizations navigating concurrent NIS2 and DORA compliance obligations, and prioritized recommendations for CISOs and security leaders operating within this environment.
Europe’s Threat Environment: A Strategic Overview
Geopolitical Context
The cyber threat environment confronting Europe cannot be understood in isolation from the geopolitical forces shaping it. Three strategic dynamics define the context for 2025.
The Russia-Ukraine conflict remains the single most consequential driver of state-sponsored cyber operations against European targets. Entering its fourth year, the conflict has sustained a persistent tempo of Russian intelligence operations targeting NATO member states, EU institutions, and critical infrastructure operators across the continent. GRU-affiliated units (APT28/Fancy Bear, Sandworm) and SVR operations (APT29/Cozy Bear) have expanded their targeting aperture well beyond Ukraine and its immediate neighbors, conducting sustained espionage and pre-positioning campaigns against energy infrastructure, defense ministries, and diplomatic networks across Western Europe. Simultaneously, the conflict has catalyzed a pro-Russian hacktivist ecosystem that conducts regular, if often unsophisticated, disruptive operations against EU and NATO-aligned targets—operations that serve a strategic purpose in information warfare even when their technical impact is limited.
China-EU strategic competition has intensified as a driver of cyber espionage. The EU’s adoption of the European Chips Act, increasing scrutiny of Chinese investment in critical infrastructure (particularly 5G telecommunications and port facilities), and European participation in semiconductor export controls have elevated Europe’s priority as a Chinese intelligence target. MSS-affiliated groups including APT31 (Zirconium), APT41 (Winnti), and Mustang Panda have expanded operations targeting European telecommunications providers, defense contractors, and semiconductor supply chain entities. The March 2024 indictment of APT31 operators by the U.S. Department of Justice, which documented extensive targeting of European government officials and parliamentary staff, underscored the scale of these operations.
NATO’s evolving cyber posture has introduced additional complexity. The Alliance’s 2024 acknowledgement of cumulative offensive cyber operations and the establishment of the NATO Integrated Cyber Defence Centre (NICC) in Mons, Belgium signal a maturation of collective cyber defense capabilities. However, these developments have also prompted adversary adaptation: Russian and Chinese operators have increased their use of operational relay box (ORB) networks—compromised SOHO routers and IoT devices within European address space—to stage operations, making traffic analysis and attribution significantly more difficult for defenders.
“Europe is no longer a secondary theater in global cyber conflict. It is a primary battleground where state-sponsored espionage, criminal ransomware, and ideological hacktivism converge on the same target set with increasing intensity.”
Dark Angel Threat Intelligence Team, January 2025Regulatory Landscape
The European regulatory environment for cybersecurity is undergoing the most significant transformation since the original NIS Directive. Three regulatory frameworks are simultaneously reshaping organizational obligations and, consequently, the threat surface.
NIS2 (Directive (EU) 2022/2555) reached its transposition deadline on 17 October 2024, requiring all 27 member states to enact national legislation implementing its expanded scope and strengthened requirements. The directive broadened the definition of essential and important entities to encompass approximately 160,000 organizations across the EU—a tenfold increase from the original NIS Directive’s estimated 15,000 operators of essential services. As of January 2025, only 8 of 27 member states had completed full legislative transposition, creating a patchwork of implementation maturity that threat actors can exploit. Organizations operating across multiple EU jurisdictions face particular challenges in navigating divergent national implementations of a theoretically harmonized directive.
DORA (Regulation (EU) 2022/2554), the Digital Operational Resilience Act, entered full application on 17 January 2025. Unlike NIS2, DORA is a regulation (directly applicable without national transposition) and imposes granular requirements on financial entities including banks, insurance firms, investment funds, and—critically—their ICT third-party service providers. DORA’s threat-led penetration testing (TLPT) requirements, modeled on the TIBER-EU framework, mandate that significant financial entities conduct intelligence-driven red team exercises based on realistic threat scenarios. This creates a direct operational link between threat intelligence and compliance obligations.
The EU Cyber Resilience Act (CRA), adopted in October 2024, introduces mandatory cybersecurity requirements for products with digital elements sold in the EU market. While full enforcement is phased over 36 months, the CRA’s vulnerability handling and incident reporting requirements will fundamentally reshape how hardware and software vendors manage security across product lifecycles. For threat intelligence practitioners, the CRA’s requirement for manufacturers to monitor and report actively exploited vulnerabilities will generate new intelligence data streams beginning in 2026.
Ransomware Targeting Europe
European organizations faced a sharp escalation in ransomware activity throughout 2024. Dark Angel’s monitoring of 47 active data leak sites (DLS) documented 1,694 confirmed European victim organizations posted across the year, representing a 28% increase from the 1,323 European entities recorded in 2023. Europe now accounts for approximately 31% of the global ransomware victim pool, up from 24% in 2023 and 19% in 2022—a trajectory that reflects both the maturation of European targeting by ransomware affiliates and the growing availability of initial access to European networks through the underground marketplace.
Geographic Distribution
The following table presents the top 10 European countries by documented ransomware incidents in 2024, based on Dark Angel’s comprehensive DLS monitoring and corroborated incident reporting.
| Rank | Country | Confirmed Incidents (2024) | YoY Change | Primary Sectors Targeted |
|---|---|---|---|---|
| 1 | Germany | 312 | +34% | Manufacturing, Automotive, Engineering |
| 2 | United Kingdom | 298 | +22% | Financial Services, Legal, Healthcare (NHS) |
| 3 | France | 241 | +31% | Government, Aerospace & Defense, Retail |
| 4 | Italy | 198 | +38% | Manufacturing, SME Sector, Healthcare |
| 5 | Netherlands | 112 | +19% | Logistics, Technology, Professional Services |
| 6 | Spain | 104 | +26% | Tourism, Retail, Municipal Government |
| 7 | Poland | 87 | +52% | Energy, Transportation, Government |
| 8 | Belgium | 72 | +29% | EU Institutions Supply Chain, Chemicals |
| 9 | Sweden | 64 | +41% | Defense Industry, Technology, Healthcare |
| 10 | Switzerland | 58 | +17% | Pharma, Financial Services, Manufacturing |
Germany’s position as Europe’s most-targeted nation reflects the country’s dense concentration of mid-market manufacturing firms (the Mittelstand), which combine high-value intellectual property with historically lower cybersecurity investment relative to their operational significance. The Bundesamt für Sicherheit in der Informationstechnik (BSI) documented a 23% increase in reported ransomware incidents for 2024, consistent with Dark Angel’s independent tracking. Italy’s 38% year-over-year increase is notable: the country’s SME-heavy economy, with over 4 million small and medium enterprises constituting 99.9% of all businesses, presents a target-rich environment characterized by limited security resources and low incident reporting rates.
Poland’s 52% increase—the steepest growth among top-ten nations—is attributable in part to its frontline position in the Russia-Ukraine conflict. Polish logistics, energy, and government entities have faced both opportunistic ransomware campaigns and suspected state-linked destructive operations masquerading as criminal activity, a pattern consistent with Russian hybrid warfare doctrine.
European manufacturing accounts for 22% of all ransomware incidents on the continent—surpassing the global average of 18% for the sector. Germany, Italy, and France collectively account for 68% of manufacturing-sector ransomware victims in Europe, reflecting these nations’ concentration of industrial capacity and the attractiveness of operational technology environments to extortion operators.
Sector Breakdown
Manufacturing (22% of European incidents) remains the most impacted sector, with ransomware operators specifically valuing the operational disruption leverage that manufacturing downtime creates. Average dwell time in European manufacturing environments was 4.2 days in 2024, shorter than the cross-sector European average of 5.8 days, suggesting that operators accelerate encryption timelines in environments where production stoppages create immediate financial pressure to pay.
Government and public sector entities (16%) experienced intensified targeting, driven by both financially motivated operations and suspected state-linked campaigns. Municipal governments in Germany, France, and Spain were disproportionately affected, with the ransomware-induced shutdown of Anhalt-Bitterfeld’s IT systems in 2021 establishing a pattern that continues to be replicated across European local government. ANSSI reported 187 confirmed ransomware incidents affecting French public sector entities in 2024, a 42% increase from the prior year.
Healthcare (14%) remains an acute concern. The Synnovis attack in June 2024—attributed to Qilin ransomware—disrupted pathology services across major NHS hospitals in London for weeks, demonstrating the cascading impact of supply chain attacks in interconnected healthcare systems. Across the EU, hospital operators face a particularly challenging dynamic: NIS2 classifies healthcare as an essential sector with heightened security obligations, but the fragmented procurement structures and legacy system dependencies characteristic of European health systems constrain the pace of security modernization.
Financial services (11%), while historically better defended than other sectors, experienced a notable increase in targeting coinciding with DORA’s implementation timeline. Dark Angel observed ransomware affiliates specifically targeting ICT service providers within financial sector supply chains—a vector that exploits DORA’s third-party risk framework before the regulation’s enforcement mechanisms have fully matured.
State-Sponsored Threat Activity
Russian Intelligence Operations
Russian state-sponsored cyber operations against European targets maintained an elevated and diversified tempo throughout 2024, with distinct operational profiles across the GRU, SVR, and FSB intelligence services.
APT28 (Fancy Bear / Forest Blizzard / Unit 26165, GRU) remained the most prolific Russian threat actor targeting Europe. The group sustained long-duration campaigns against European foreign affairs ministries, defense establishments, and think tanks involved in Ukraine policy. In 2024, APT28 operations were characterized by exploitation of Microsoft Outlook vulnerabilities (CVE-2023-23397 and its bypass CVE-2023-29324), phishing campaigns leveraging compromised government email accounts across at least 14 European nations, and sustained targeting of webmail platforms (Roundcube, Zimbra) used by European diplomatic missions. The Czech Republic and Germany publicly attributed APT28 intrusions against their governmental networks in May 2024—a relatively rare joint attribution statement that underscored the political significance of the campaigns. Dark Angel’s infrastructure tracking identified 47 unique APT28 command-and-control domains impersonating European government and academic institutions during 2024.
APT29 (Cozy Bear / Midnight Blizzard, SVR) continued its methodical targeting of European diplomatic, political, and technology sector entities. The group’s compromise of Microsoft’s corporate environment—disclosed in January 2024 and attributed to password spraying a legacy test tenant lacking MFA—provided SVR operators access to email correspondence between Microsoft and numerous European government customers. Throughout 2024, APT29 expanded its use of cloud service abuse, leveraging Microsoft Graph API, OneDrive, and Azure AD for command-and-control and data exfiltration. This “living off the cloud” approach exploits the trust organizations place in Microsoft’s infrastructure and complicates detection by blending malicious traffic with legitimate SaaS activity. European cloud-first organizations are particularly vulnerable to this tradecraft.
Sandworm (Seashell Blizzard / Unit 74455, GRU), historically focused on destructive operations against Ukrainian infrastructure, expanded its reconnaissance and pre-positioning activities against European energy and transportation networks. While no confirmed destructive attack against Western European infrastructure occurred in 2024, intelligence indicators suggest Sandworm has established persistent access to operational technology (OT) environments in multiple European energy utilities—access that could be activated in a crisis escalation scenario. The group’s December 2023 attack on Ukraine’s Kyivstar telecommunications provider, which disrupted mobile services for 24 million subscribers, demonstrated both the capability and willingness to target critical infrastructure at scale.
Dark Angel assesses with moderate confidence that Russian intelligence services have established persistent access within multiple Western European critical infrastructure networks that has not yet been activated for disruptive purposes. These pre-positioned accesses represent a strategic hedge that could be leveraged in the event of a significant escalation in the Russia-NATO relationship. European critical infrastructure operators should assume persistent threat actor presence and conduct threat hunting campaigns focused on OT/IT boundary systems.
Chinese APT Operations in Europe
Chinese state-sponsored operations targeting Europe intensified significantly in 2024, driven by strategic intelligence requirements around semiconductor policy, 5G infrastructure decisions, trade negotiations, and South China Sea diplomacy.
APT31 (Zirconium / Violet Typhoon) conducted extensive targeting of European parliamentarians, political staff, and policy researchers. The U.S. DOJ indictment of seven APT31 operatives in March 2024 revealed campaigns targeting the Inter-Parliamentary Alliance on China (IPAC), individual Members of the European Parliament (MEPs), and national parliamentary staff in at least eight EU member states. The Finnish Security and Intelligence Service (Supo) publicly confirmed APT31 compromise of the Finnish parliament’s IT systems in 2021, with the investigation concluding in 2024. Dark Angel’s analysis indicates APT31 campaigns against European political targets continued through 2024, migrating from traditional spearphishing to exploitation of edge devices and SOHO routers as operational relay infrastructure.
APT41 (Winnti / Wicked Panda) maintained persistent campaigns against European semiconductor, automotive, and telecommunications entities. The group’s dual mandate—serving both state intelligence requirements and conducting financially motivated intrusions—makes it particularly dangerous. In 2024, APT41 operations exploited vulnerabilities in Ivanti EPMM and Citrix NetScaler to establish footholds in European manufacturing and technology companies, conducting long-duration data exfiltration campaigns lasting months before detection. The group’s specific interest in EUV lithography technology and advanced chip design intellectual property aligns with China’s strategic imperative to achieve semiconductor self-sufficiency.
Mustang Panda (Bronze President) expanded targeting from its traditional Southeast Asian focus into European diplomatic networks, particularly entities involved in EU-China policy. The group deployed its signature PlugX RAT through USB propagation campaigns targeting conference attendees and diplomatic personnel, alongside phishing campaigns leveraging EU foreign policy documents as lures. CERT-EU documented multiple Mustang Panda intrusions against European External Action Service (EEAS) affiliated networks during 2024.
Iranian Threat Activity
IRGC-affiliated groups including APT42 (Charming Kitten) and MuddyWater maintained operations targeting European entities, though at lower volume than Russian and Chinese actors. Iranian targeting in Europe focused on three areas: surveillance of diaspora communities and political dissidents in France, Germany, and the Netherlands; intelligence collection against nuclear diplomacy frameworks (JCPOA-related entities); and destructive operations against organizations perceived as hostile to the regime. The Albanian government’s severing of diplomatic relations with Iran following the 2022 cyberattacks on AKSHI (the national information agency) established that Iran is willing to conduct destructive operations against European-aligned targets, a precedent that shapes risk calculations for organizations engaged in Iran-related policy.
Hacktivism and Information Operations
Pro-Russian Hacktivist Ecosystem
The pro-Russian hacktivist ecosystem targeting European institutions and critical infrastructure maintained a high operational tempo throughout 2024, though the movement’s structure has evolved significantly from the early post-invasion period. The original KillNet operation, which dominated pro-Russian hacktivism in 2022–2023, largely fragmented by mid-2024, with its founder (“KillMilk”) publicly distancing himself from the movement. However, successor and affiliate groups have proliferated and, in several cases, demonstrated more sophisticated capabilities than their predecessors.
NoName057(16) established itself as the most persistent and operationally active pro-Russian hacktivist group targeting Europe. Operating primarily through its DDoSia crowdsourced attack platform—which incentivizes participants with cryptocurrency payments for contributing DDoS traffic—the group conducted coordinated campaigns against government websites, transportation systems, and financial institutions across EU member states. Dark Angel documented over 2,800 claimed attacks by NoName057(16) against European targets in 2024, with particular focus on nations providing military assistance to Ukraine: Czech Republic, Poland, Lithuania, Latvia, Estonia, Finland, and France. While the technical impact of these DDoS campaigns is typically measured in minutes to hours of service disruption, their strategic value lies in generating media coverage, creating an impression of vulnerability, and taxing incident response resources.
CyberArmyofRussia_Reborn represents a more concerning escalation. Linked by Western intelligence agencies to GRU Unit 29155, the group has moved beyond website defacement and DDoS to claim attacks on operational technology systems. In January 2024, the group published video purporting to show manipulation of SCADA interfaces at water treatment facilities in Texas; while the actual impact was minimal, the incident demonstrated targeting of industrial control systems that had previously been considered below the threshold of hacktivist activity. Similar claims against European utilities remain unverified but cannot be dismissed given the group’s assessed intelligence service linkage.
Influence Operations Targeting European Elections
The 2024 European Parliament elections (6–9 June) and multiple national elections across EU member states presented high-value targets for information operations. Dark Angel’s monitoring identified coordinated inauthentic behavior across social media platforms promoting narratives designed to erode trust in EU institutions, amplify societal divisions on migration and energy policy, and undermine support for Ukraine. The Doppelgänger campaign—attributed to Russian actors by VIGINUM (France’s foreign digital interference agency) and the European External Action Service—continued operating cloned news websites impersonating outlets including Le Monde, Der Spiegel, and The Guardian to distribute fabricated articles. While the direct electoral impact of these operations remains contested among analysts, their persistence and industrial scale indicate a sustained commitment of resources by their sponsors.
“The distinction between hacktivism and state-sponsored operations in the European context has become analytically meaningless. Groups presenting as ideologically motivated volunteers increasingly operate with state-provided infrastructure, targeting, and protection.”
Dark Angel Strategic Intelligence Assessment, Q4 2024Supply Chain and Third-Party Risk
Supply chain compromise has matured from an occasional high-impact technique into a structural feature of the European threat landscape. The concentration of digital supply chain dependencies among a relatively small number of globally significant vendors creates systemic risk that national and sectoral boundaries cannot contain.
The MOVEit legacy. The Cl0p exploitation of MOVEit Transfer vulnerabilities (CVE-2023-34362) in mid-2023 affected over 2,600 organizations globally, with European entities accounting for approximately 35% of confirmed victims. The operational template—mass-exploiting a zero-day vulnerability in a widely deployed enterprise file transfer appliance to exfiltrate data from hundreds of organizations in a single campaign—has been replicated with variations throughout 2024. Cl0p’s subsequent exploitation of Cleo Harmony and VLTrader in Q4 2024 affected an additional 66 organizations, many of them European logistics and supply chain firms. The pattern is clear: threat actors recognize that targeting shared infrastructure yields exponentially greater returns than targeting individual organizations.
Managed service provider (MSP) compromise continued to generate cascading impacts across European organizations. The Kaseya VSA incident of 2021 established the template, but smaller-scale MSP compromises occur with regularity and generate disproportionate impact relative to their individual visibility. Dark Angel’s incident tracking documented 23 confirmed cases in 2024 where compromise of a European managed service provider resulted in ransomware deployment or data exfiltration affecting the MSP’s client organizations. The average blast radius was 14 downstream organizations per MSP compromise. These incidents disproportionately affect SMEs that lack the resources for in-house security operations and depend entirely on their MSP for cybersecurity.
Open source software dependencies present a persistent and underappreciated supply chain risk. The XZ Utils backdoor (CVE-2024-3094), discovered in March 2024 through the vigilance of a single Microsoft developer, revealed a sophisticated multi-year social engineering campaign designed to insert a backdoor into a critical Linux compression library present on virtually every Linux system. The backdoor targeted OpenSSH authentication and was attributed by multiple intelligence services to a state-sponsored actor. While the compromise was detected before reaching stable Linux distributions, it exposed the fragility of the open source ecosystem on which European critical infrastructure depends—and the realistic possibility that undiscovered supply chain compromises of similar sophistication may already exist.
European organizations exhibit concentrated dependency on U.S.-headquartered cloud, identity, and SaaS platforms. A significant compromise of Microsoft Entra ID (formerly Azure AD), AWS IAM, or a major European SaaS provider (SAP, OVHcloud) would have cascading effects across European critical infrastructure sectors simultaneously. DORA’s ICT concentration risk provisions and NIS2’s supply chain security requirements address this risk, but implementation lags behind the threat.
Regulatory Impact Assessment
NIS2 Implementation Gaps
The NIS2 Directive’s October 2024 transposition deadline has produced the uneven regulatory landscape that critics predicted. As of January 2025, comprehensive national transposition has been completed in Belgium, Croatia, Hungary, Italy, Latvia, Lithuania, Luxembourg, and Slovenia. An additional 11 member states have draft legislation in parliamentary proceedings. The remaining 8 member states—including Germany, whose NIS2 transposition (the NIS2UmsuCG) stalled when the coalition government collapsed in November 2024—have not progressed legislation beyond initial drafting stages. The European Commission launched infringement proceedings in November 2024 against the 23 member states that had not met the deadline, but the practical effect on enforcement timelines remains limited.
This fragmentation creates operational challenges for organizations operating across multiple member states. A multinational manufacturer headquartered in Germany with operations in Italy, Poland, and the Netherlands faces four distinct regulatory regimes at varying stages of maturity. The directive’s requirement for 24-hour early warning and 72-hour incident notification to competent authorities is technically consistent across member states, but the designated national authorities, reporting procedures, and enforcement mechanisms differ. Dark Angel has observed organizations deprioritizing security investments while awaiting final legislative clarity—a rational but dangerous response that threat actors can exploit.
DORA Readiness in Financial Services
DORA’s application from 17 January 2025 imposes the most granular cybersecurity and operational resilience requirements yet mandated for any European sector. Dark Angel’s assessment of readiness across the European financial sector, based on engagement with 45 financial entities and their ICT providers, reveals a mixed picture.
Large, systemically significant institutions (G-SIBs and major insurance groups) have largely achieved compliance with DORA’s core requirements, having leveraged existing EBA/EIOPA guidelines and TIBER-EU frameworks as foundations. However, mid-tier financial entities—regional banks, insurance intermediaries, payment institutions, and crypto-asset service providers—face significant gaps in ICT risk management documentation, third-party contract alignment, and incident classification capabilities. The regulation’s requirements for ICT third-party risk management, including maintaining a register of contractual arrangements and ensuring audit rights with critical ICT service providers, has proven particularly challenging for entities with complex, multi-layered vendor ecosystems.
Of greatest concern from a threat intelligence perspective is DORA’s Threat-Led Penetration Testing (TLPT) requirement. Article 26 mandates that certain financial entities conduct testing based on realistic threat scenarios at least every three years, with tests incorporating threat intelligence that reflects the actual cyber threat landscape facing the specific entity. This creates a direct operational dependency on high-quality, entity-specific threat intelligence—a capability that many European financial institutions currently source externally or lack entirely. Dark Angel anticipates that the TLPT requirement will drive significant growth in demand for European-focused financial sector threat intelligence services throughout 2025–2026.
Cross-Border Incident Reporting
Both NIS2 and DORA impose structured incident reporting obligations with tight timelines. NIS2 requires an early warning to the relevant CSIRT within 24 hours, followed by an incident notification within 72 hours and a final report within one month. DORA prescribes similar but not identical timelines for major ICT-related incidents in financial services. For organizations subject to both frameworks (such as financial entities that also qualify as essential entities under NIS2), the reporting obligations can be duplicative and, in some national implementations, directed to different competent authorities.
The practical challenge is compounded by the difficulty of achieving regulatory compliance during an active incident. Organizations facing a sophisticated ransomware attack or state-sponsored intrusion—events that consume all available incident response resources—must simultaneously classify the incident against regulatory thresholds, prepare notifications in mandated formats, and coordinate with multiple national authorities across jurisdictions. Dark Angel recommends that organizations establish pre-drafted notification templates and escalation procedures that integrate regulatory reporting into incident response playbooks rather than treating compliance as a parallel workstream.
Defensive Recommendations for European Organizations
Based on Dark Angel’s comprehensive analysis of the European threat landscape, we present the following prioritized recommendations for CISOs and security leaders. These recommendations are specifically calibrated for the European context, addressing the convergence of state-sponsored, criminal, and hacktivist threats within the concurrent NIS2 and DORA compliance environment.
- Implement threat-informed defense prioritization. Resource allocation should be driven by the specific threat profile facing your organization rather than generic maturity models. A German manufacturer in the defense supply chain faces a fundamentally different threat from a Dutch financial services provider or a Polish energy utility. Invest in or procure threat intelligence that maps adversary groups, TTPs, and targeting patterns to your specific sector, geography, and technology stack. Use this intelligence to prioritize controls against the attack vectors most likely to be employed against you.
- Accelerate edge device and VPN appliance security. Exploitation of internet-facing appliances (Ivanti, Fortinet, Citrix, Palo Alto) is the dominant initial access vector across all threat actor categories in Europe. Maintain a real-time inventory of exposed edge devices, subscribe to vendor security advisories, and implement emergency patching procedures with target timelines of 24–48 hours for critical vulnerabilities in perimeter devices. Consider migrating to zero-trust network access (ZTNA) architectures that reduce dependence on traditional VPN infrastructure.
- Deploy phishing-resistant authentication across all external access points. FIDO2 security keys or passkeys should replace password+OTP and push-notification MFA for VPN access, privileged accounts, cloud administration, and remote access gateways. Both Russian APTs and ransomware affiliates routinely defeat legacy MFA through AiTM phishing, session token theft, and MFA fatigue. The European Commission’s eIDAS 2.0 framework provides an additional impetus for strong authentication migration.
- Integrate NIS2/DORA incident reporting into IR playbooks. Do not treat regulatory notification as an afterthought during incident response. Pre-draft notification templates for each applicable framework, identify competent authorities for each jurisdiction in which you operate, establish legal review procedures that can be executed within initial reporting timelines, and conduct tabletop exercises that specifically incorporate regulatory notification as a response workstream. Assign a dedicated regulatory liaison role within your IR team.
- Conduct OT security assessments and segment IT/OT boundaries. European industrial organizations, utilities, and transportation operators face credible threats from Russian pre-positioning activities in OT environments. Implement network segmentation between IT and OT zones, deploy OT-specific monitoring capabilities, eliminate unnecessary connectivity between corporate networks and industrial control systems, and conduct threat hunting specifically targeting the ICS-focused TTPs documented in the MITRE ATT&CK for ICS framework.
- Map and manage ICT supply chain risk with regulatory alignment. DORA’s ICT third-party risk management and NIS2’s supply chain security requirements demand systematic identification, assessment, and monitoring of critical ICT dependencies. Maintain a register of critical ICT service providers, ensure contractual provisions for audit rights and incident notification, conduct concentration risk analysis for shared dependencies, and implement software bill of materials (SBOM) capabilities for critical applications.
- Establish DDoS mitigation for public-facing services. Pro-Russian hacktivist groups conduct high-frequency DDoS campaigns against European government, transportation, and financial sector websites. While the direct impact is typically limited to service availability, the reputational and operational overhead is real. Implement cloud-based DDoS protection, establish playbooks for communicating during sustained campaigns, and ensure that DDoS events do not consume incident response resources needed for more consequential threats.
- Invest in detection engineering for cloud and identity-based attacks. APT29’s “living off the cloud” tradecraft and the growing prevalence of cloud-native attack paths (Azure AD/Entra ID abuse, OAuth token theft, cross-tenant compromise) require detection capabilities that extend beyond traditional network and endpoint monitoring. Implement Microsoft 365 unified audit logging at E5 level, deploy cloud access security brokers (CASB), monitor for anomalous OAuth application consents, and establish baselines for Graph API and service principal activity.
Methodology
This report represents Dark Angel’s annual strategic assessment of the European cyber threat landscape, synthesizing intelligence from multiple collection disciplines across calendar year 2024.
Data Leak Site Monitoring: Continuous automated and manual monitoring of 47 active ransomware DLS on Tor, with victim geolocation based on organizational registration, operational headquarters, and confirmed incident reports. European victim counts include all EU-27 member states, the United Kingdom, Norway, Switzerland, and non-EU Balkan states.
Incident Response Intelligence: Analysis of 520 incident response engagements involving European organizations, conducted by Dark Angel and partner firms across 18 European nations. Incident data includes initial access vector identification, threat actor attribution where achievable, dwell time measurement, and impact assessment.
Government Reporting: Systematic analysis of public reporting from 22 European national CSIRTs and cybersecurity authorities, including ANSSI (France), BSI (Germany), NCSC (United Kingdom), AIVD/MIVD (Netherlands), CERT-EU, and ENISA. Classified and TLP-restricted reporting is incorporated where distribution controls permit.
Underground Intelligence: Monitoring of Russian-language forums (XSS, Exploit, RAMP), Chinese-language forums, Telegram channels, and dark web marketplaces for initial access broker listings, affiliate recruitment, and operational discussions affecting European entities.
Technical Intelligence: Infrastructure analysis, malware reverse engineering, and network traffic analysis conducted by Dark Angel’s technical intelligence team. APT infrastructure tracking covers domains, IP addresses, TLS certificates, and operational relay box (ORB) networks associated with state-sponsored groups active in Europe.
Confidence Framework: Assessments in this report use the Admiralty Code for source reliability and information credibility. Statistical data derived from DLS monitoring carries high confidence. Attribution assessments carry moderate-to-high confidence where corroborated by multiple intelligence sources and low-to-moderate confidence where based on technical indicators alone. Forward-looking assessments are presented as analytical judgments with stated confidence levels.
Related Reports
- NIS2 Threat Intelligence Requirements: A Practitioner’s Guide — Mapping NIS2 obligations to operational threat intelligence capabilities.
- DORA ICT Risk & Threat Intelligence: Financial Sector Compliance — Deep-dive into DORA’s threat intelligence and TLPT requirements for financial entities.
- The State of Ransomware 2025 — Comprehensive global ransomware ecosystem analysis covering 8 major groups, MITRE ATT&CK mapping, and defensive recommendations.
Protect Your European Operations
Dark Angel delivers continuous threat intelligence, NIS2/DORA compliance support, and incident response services purpose-built for European enterprises and critical infrastructure operators.
Request a Briefing