Executive Summary
Public administrations across the European Union are increasingly under fire from a diverse range of cyber threats, according to a new sector-specific threat landscape report from the European Union Agency for Cybersecurity (ENISA). The report, published in November 2025, identifies Distributed Denial-of-Service (DDoS) attacks as the most frequent threat, accounting for 60% of incidents, with pro-Russian hacktivist group NoName057(16) being the primary perpetrator. However, ENISA warns that data-related threats and ransomware, while less frequent, cause more substantial damage and disruption to essential public services. The report also highlights persistent cyber-espionage campaigns from state-sponsored actors linked to Russia and China. With the public sector newly regulated under the NIS2 Directive, ENISA assesses that these institutions are in a vulnerable transition period and require urgent security enhancements.
Threat Overview
The report paints a picture of a sector under siege from multiple angles:
- Hacktivism (DDoS): The most voluminous threat comes from politically motivated hacktivist groups. These actors launch high-volume
T1498 - Network Denial of Service attacks to disrupt the availability of government websites and services, aiming to make a political statement and erode public trust. NoName057(16) alone was responsible for 46% of these DDoS attacks.
- Data-Related Threats: Accounting for 17.4% of incidents, these include data breaches and data exposures. These attacks are more severe, as they compromise sensitive citizen data from platforms like employment services and law enforcement portals, leading to privacy violations and a high risk of fraud.
- Ransomware: Making up 10% of cases, ransomware attacks cause significant operational disruption, locking up critical systems and halting the delivery of public services. These attacks combine data encryption with the threat of data leakage.
- Cyber-espionage: Nation-state actors, particularly those from Russia and China, continue to target EU governmental bodies for intelligence-gathering purposes, seeking to gain political and economic advantages.
Central governments are the primary target, bearing the brunt of 69% of all recorded incidents.
Impact Assessment
The consequences of these attacks on public administrations are severe and multifaceted:
- Disruption of Essential Services: DDoS and ransomware attacks can bring government operations to a standstill, preventing citizens from accessing critical services related to healthcare, social security, and law enforcement.
- Erosion of Public Trust: Successful cyberattacks against government institutions damage public confidence in the state's ability to protect their data and provide reliable services.
- Compromise of Sensitive Data: The theft of personal, financial, and health information from government databases can lead to widespread identity theft and fraud, affecting millions of citizens.
- National Security Risks: Espionage campaigns can expose sensitive government strategies, diplomatic communications, and economic data, undermining national security and the EU's geopolitical standing.
- Regulatory and Financial Costs: Breaches under the NIS2 Directive will lead to significant regulatory fines and high costs for incident response, recovery, and security upgrades.
Compliance Guidance (NIS2)
The ENISA report underscores the challenges public administrations face in complying with the NIS2 Directive. Key recommendations for these organizations include:
- Conduct Risk Assessments: Perform comprehensive risk assessments to identify critical assets, data repositories, and key services. Map threats identified in the ENISA report to the organization's specific environment.
- Develop Incident Response Plans: Establish and regularly test incident response plans specifically for DDoS, ransomware, and data breach scenarios. This is a core requirement of NIS2.
- Implement Baseline Security Measures: NIS2 mandates a range of security measures. Prioritize the implementation of multi-factor authentication, robust access control, network segmentation, and regular software patching.
- Strengthen Supply Chain Security: Assess the security posture of all third-party suppliers and service providers, as they represent a significant vector for attack.
- Report Incidents Promptly: Establish clear procedures for reporting significant incidents to the national CSIRT or competent authority within the deadlines stipulated by NIS2 (24 hours for an early warning, 72 hours for a full notification).
Detection & Response
To counter the threats highlighted by ENISA, public administrations should focus on:
- DDoS Detection and Mitigation: Implement a DDoS mitigation service, either on-premises or cloud-based. Monitor network traffic for unusual spikes in volume or specific traffic patterns associated with DDoS tools. This aligns with D3FEND's
D3-NTA: Network Traffic Analysis.
- Data Exfiltration Detection: Use Data Loss Prevention (DLP) tools and network traffic analysis to detect and block unauthorized outbound transfers of large volumes of data. This relates to D3FEND's
D3-OTF: Outbound Traffic Filtering.
- Behavioral Monitoring: Deploy EDR and SIEM solutions to monitor for ransomware pre-cursors, such as the use of tools like
PsExec for lateral movement or attempts to disable security software. This is an application of D3FEND's D3-PA: Process Analysis.
Mitigation
ENISA's report implicitly calls for a defense-in-depth strategy:
- Architectural Resilience: Adopt a Zero Trust architecture. Implement robust network segmentation to contain breaches and prevent lateral movement. This is a key principle of D3FEND's
D3-NI: Network Isolation.
- Harden Public-Facing Services: Secure all web applications and APIs against common vulnerabilities (e.g., OWASP Top 10). Use a Web Application Firewall (WAF) to protect against common attack patterns. This is a form of D3FEND's
D3-ACH: Application Configuration Hardening.
- User Training and Awareness: Conduct regular training for employees to recognize phishing attempts, which are a common initial access vector for both ransomware and espionage campaigns.
- Multi-Factor Authentication (MFA): Mandate MFA for all employees and contractors to protect against credential theft and abuse. This is a direct implementation of D3FEND's
D3-MFA: Multi-factor Authentication.