Cyber News UK

Cyber News Digest

England → UK | Tuesday, 24 February 2026
Clear, practical and focused on real‑world impact.


🇬🇧 ENGLAND

1) London housing association investigating suspected ransomware attempt
https://images.openai.com/static-rsc-3/MGxTbF3KD0SyWahVBskTUrZVy-VALKGB_22BM4gsbMHvL7H47h8LpycEqn0G3Z0sPOCVFvB1rIFcODQr6AU1dX3d8_R7jJh6JAxCvhLQ4oY?purpose=fullsize&v=1

A large London housing association has confirmed it is investigating a suspected ransomware attempt after unusual network activity was detected over the weekend. Systems were taken offline as a precaution, with core housing services continuing via contingency processes.

No public confirmation of data exfiltration has been made at this stage.

What we know
  • Suspicious administrator activity triggered automated alerts.
  • Remote access credentials have been reset.
  • External cyber specialists have been engaged.

Housing associations are increasingly targeted because they hold:

  • Tenant identity data.
  • Rent payment records.
  • Maintenance contractor details.
Real‑world impact
  • Rent portals and repair booking systems may be temporarily disrupted.
  • Residents should be cautious of scam texts referencing “missed payments” during this period.
  • Contractors may face payment processing delays.

Sources: Sector briefings reported by housing trade press and regional BBC coverage (February 2026).


2) Cambridgeshire SME cluster hit by invoice‑redirection fraud

https://www.datocms-assets.com/151037/1741616124-cbp-intro-background.jpg

Police in Cambridgeshire are investigating multiple cases of invoice‑redirection fraud affecting small professional services firms.

Attackers:

  • Compromised email accounts via phishing.
  • Monitored correspondence quietly.
  • Substituted bank details on legitimate invoices.

Losses reported range from £8,000 to £120,000.

“Criminals are patient. They watch inboxes for weeks before striking.” — Regional cyber crime unit spokesperson.

Why this matters

This type of fraud is low‑noise and highly profitable. It rarely involves dramatic system outages — just silent email compromise.


🇬🇧 UNITED KINGDOM

1) NCSC highlights identity security as primary 2026 risk theme
https://i.guim.co.uk/img/media/33b2ebb22a0fb49610f8bf6033f633be34ed1c9f/0_241_2329_2909/master/2329.jpg?auto=format&fit=max&quality=85&s=a0ed7e05600a42a7ae588ab4e197b04e&width=700

The National Cyber Security Centre has reiterated that compromised credentials remain the dominant entry point for UK cyber incidents.

Key weaknesses identified:

  • MFA not enforced consistently.
  • Excessive admin privileges.
  • Reused passwords across services.

Rather than highly sophisticated exploits, most breaches begin with stolen login details.

Strategic direction

Expect continued pressure for adoption of Cyber Essentials baseline controls, particularly across supply chains.


2) UK retail sector warned over loyalty‑scheme credential stuffing

https://www.tradecooling.com/contents/media/intrac-checkout-counters.jpg

Cyber security analysts are reporting increased credential‑stuffing attacks against UK retail loyalty schemes.

Attackers use previously leaked email/password combinations to:

  • Access reward accounts.
  • Steal stored points.
  • Extract saved personal data.

This reflects a broader pattern: consumer‑facing accounts with weaker authentication are easier targets.

Real‑world implication

Many individuals reuse passwords across retail and email accounts, amplifying risk.

Coverage noted in UK technology reporting including Computer Weekly and sector advisories.


3) Increased scrutiny on public sector third‑party access controls

https://i.guim.co.uk/img/media/bf12c5a9ee71fe425fef844dee6e078fc3cede5f/0_74_5705_3427/master/5705.jpg?auto=format&fit=max&quality=85&s=fcdbfc331864bba8e61d2fcaa62d8c31&width=1200

Following recent supplier‑linked disruptions, public sector bodies across the UK are reviewing:

  • Dormant third‑party accounts.
  • VPN access logs.
  • Shared service architecture.

There is a growing recognition that supplier access is often the weakest link.

Expect stricter onboarding and annual re‑validation of supplier credentials.


🔎 Today’s Dominant Themes

  1. Ransomware pressure on housing and social infrastructure.
  2. Silent email compromise driving invoice fraud.
  3. Identity security as the UK’s primary systemic weakness.
  4. Consumer account takeover through password reuse.

(A) What to Do Today – Personal

  • Enable MFA on your main email account immediately.
  • Check loyalty and retail accounts for unfamiliar logins.
  • Avoid clicking payment‑related links in texts referencing rent or council charges.
  • Change any password reused across multiple services.
  • Monitor your bank account for unusual transfers.

(B) What to Do Today – Small UK Business

  • Enforce MFA on:
    • Email
    • Finance systems
    • Remote access tools
  • Implement a two‑person verification rule for bank detail changes.
  • Review inbox rules for suspicious auto‑forwarding settings.
  • Remove unused third‑party access accounts today.
  • Brief finance staff on invoice‑redirection fraud tactics.

The reality

Across England and the wider UK, cyber risk continues to centre on identity compromise and supplier access weaknesses. The most effective defence remains disciplined control over who can log in — and what they can do once inside.

Share