top of page
Search

The Rise of cyberattacks and simulations: AN overview on what to know and how to prepare


DID YOU KNOW?

In totality, 2024 has experienced the highest number of cyberattacks globally, with 9,478 publicly disclosed incidents and approximately 35.9 billion records breached, as reported by IT Governance UK in their 2024 breach analysis. Additionally, Check Point Research highlighted a 30% year-over-year increase in attacks, marking the highest rise in recent years, and CrowdStrike's 2024 Global Threat Report noted a 75% increase in cloud intrusions alongside record eCrime activity, making it the worst year on record for cyber threats.


There's also been a noticeable increase in cyber pandemic simulations which are large-scale efforts run by elites to "test" how ready we are for digital chaos—think widespread cyberattacks that take down vast infrastructures, lock all digital systems, and wreak havoc on financial, healthcare, media, and education institutions. These exercises and attacks serve as a reminder of the digital vulnerabilities we face in a hyper-connected world, especially for those unprepared.


In this report, I will be providing an overview of what one should do to prepare for a grid shutdown, and how we can work together to collectively mitigate the friction caused by these attacks.



Why Cyber Pandemics and Simulations Matter

In our increasingly digital world, the internet has become the primary space we rely on to retrieve and share information that helps us make informed decisions. It has never been easier to access and transport the data we need. From media and transactions to digital identification, interconnectivity has brought undeniable convenience and efficiency.


From learning how to grow food to solving practical problems, the way we approach everyday scenarios depends on the knowledge we hold and the data we access through the internet. However, this heavy reliance on the internet comes at a cost. When was the last time you went to a library to research something? Over the past decade, the UK has lost 800 public libraries, roughly 20% of the total, leaving many communities with fewer alternatives to centralised digital systems.


The Cost of Dependency on Centralised Systems

As our reliance on digital platforms grows, so do the risks and vulnerabilities associated with them. The internet depends on a fragile chain of interconnected systems, including electricity, internet service providers (ISPs), search engines, and servers. Each of these is a weak link, susceptible to attack. Each step in using these systems to access the internet is essential, and every component introduces a point of dependency and potential vulnerability. Here is how the process unfolds:


1. Electricity

Everything begins with electricity. Without power, digital devices cannot function, and internet infrastructures come to a halt. Electricity powers the data centres that host websites, the routers that transmit data, and the devices we use to access information. No electricity means no access, making it the foundation of all digital activity.


2. Internet Service Providers (ISPs)

Once powered, devices rely on ISPs to connect to the internet. ISPs act as the gatekeepers, transmitting data between your device and the vast network of servers that house the information you seek. Without an ISP, your device cannot access websites or online resources, cutting off communication with the internet entirely.


3. Search Engines

Once connected to the internet, search engines become the primary tool for locating specific information. They index billions of webpages, allowing users to find relevant data with ease. Search engines are the bridge between raw internet access and the specific knowledge users seek. Without them, navigating the internet would be like searching for a needle in an endless haystack.


4. Servers

Finally, the information you retrieve is stored on servers, the backbone of every website and online service. Servers house the data you access, from webpages to files and applications. Your device sends a request to these servers through the internet, which then deliver the desired data back to your browser or app.


The reality is simple: without the internet, most of us would struggle to access the tools and knowledge required for self-sustainment. Information shapes our perceptions, and these perceptions drive the behaviours that define our future. Yet, by centralising our access to information in third-party infrastructures, we have handed control to monopolies that are vulnerable to cyber threats and system failures.


Ask yourself: what would you do if the internet stopped working indefinitely? Beyond the knowledge you already hold, what resources would you have left? Our dependency on digital systems leaves our collective future exposed. A single, well-coordinated attack on any part of this system could cause widespread disruption.


The more we connect through AI, machine learning, and IoT devices, the more risks we tether ourselves to. Just like biological pandemics, which spread quickly, cyber pandemics could infect digital systems even faster. Centralisation of information makes financial systems, healthcare networks, and entire infrastructures susceptible to failure.


Without loosening our dependency on these centralised systems, we leave ourselves open to widespread disruption. The solution lies in decentralising knowledge and creating resilient alternatives, ensuring we are prepared for the challenges ahead.



notable Simulations & cyberattacks in Recent Years

In many ways, 2020 was a catalyst for the acceleration of these threats. The COVID-19 pandemic forced a rapid transition to remote work and increased reliance on digital infrastructure, exposing vulnerabilities in everything from personal devices to critical infrastructure. Attackers took advantage of this shift, targeting systems unprepared for the sudden changes. Since then, the frequency and sophistication of cyberattacks have grown exponentially in the past years, and simulations of cyber chaos have only increased, signaling that these risks are being taken very seriously by those in power.


Here's a few recent attacks, to list a few:

  • In October 2024 the UK NHS Services allegedly experienced a severe disruption targeting the NHS, Russian-linked cyber criminals attacked systems related to the Ambulance Radio Programme, which is essential for connecting ambulance services to the NHS and other emergency responders. The attack significantly delayed emergency response services.

  • Furthermore, in June 2024, a ransomware attack targeted Synnovis, a pathology service for NHS facilities in South East London. This caused substantial delays in blood test processing and affected patient services due to disruptions in data handling and the compromise of sensitive medical information.

  • Transport for London (TfL) (September 2024): TfL reported suspicious activity that resulted in unauthorized access to the data of approximately 5,000 customers. Immediate action was taken to contain the breach, with investigations by the National Crime Agency and the National Cyber Security Centre​

  • CrowdStrike Security Software (July 2024): A faulty software update from CrowdStrike affected millions of devices globally, including UK hospitals, banks, and governmental systems. This incident severely impacted IT operations, halting critical services for several days.

  • In October 2024, the Internet Archive, home of the Wayback Machine, was hit by a cyberattack exposing over 31 million user accounts. Attackers exploited a DDoS (Distributed Denial of Service) attack to access usernames, emails, and encrypted passwords. While the archived data itself remains secure, the attack temporarily disrupted access to historical data, raising significant concerns about the fragility of preserving the digital history relied upon by researchers, journalists, and institutions worldwide. The inability to access this historical data during the attack underscored the critical importance of safeguarding such repositories, as they serve as a vital resource for documenting and preserving the world's collective memory.


Asides from attacks, there are also continuous simulations being undertaken by authorities, non-government organizations, and other prominent entities in the cybersecurity landscape to assess vulnerabilities and strengthen defenses:


  1. Cyber Polygon (2020–Present): One of the most significant simulations is Cyber Polygon, which began in 2020 and continues annually. Backed by the World Economic Forum (WEF), it simulates massive cyberattacks to assess how industries, governments, and organizations would respond to breaches on a global scale. Big players like IBM, INTERPOL, and major corporations participate in these exercises. The goal is to understand what happens when a "cyber pandemic" hits supply chains or banks.


  2. Global Risks Report: The WEF has consistently flagged cyber threats as one of the top global risks in recent years. Their 2021 Global Risks Report listed cyberattacks as a major long-term threat, pushing the need for more simulations and collaborative strategies to protect digital infrastructure.


  3. GridEx (2011–Present): Another critical simulation is GridEx, which tests how prepared the U.S. and other nations are to protect the power grid from cyberattacks. Since 2011, this exercise has become vital, considering that everything in modern society relies on electricity. It helps predict how a cyberattack on energy infrastructure could spiral out of control.


Another example to take for instance is the annual meetings at Davos, where government agencies, NGOs, and tech leaders gather to discuss potential global threats, including cyberattacks. Running simulations like Event 201—led by Bill Gates in 2019 to test the world’s response to a viral pandemic—or Crimson Contagion, a U.S.-led flu outbreak simulation, highlights how such exercises serve both as warnings and as preparation. If biological pandemics can disrupt societies, imagine the impact of a cyber pandemic, where entire infrastructures could be paralyzed in seconds.


It’s an indicating sign that governments and NGOs are taking steps to ensure the world is prepared for cyber threats. Once these threats emerge, they will have solutions in place to support us. As Klaus Schwab, founder of the World Economic Forum, warns:


"We all know, but still pay insufficient attention to, the frightening scenario of a comprehensive cyberattack, which would bring a complete halt to power supplies, transportation, hospital services, and our society as a whole. The COVID-19 crisis would be seen in this respect as a small disturbance in comparison to a major cyberattack."


When powerful individuals are spending millions and convening to address these issues, it's highly probable that this behaviour reflects potential insight on those with a broader panorama of foresight surrounding what may potentially come in the digital space. The more we depend on technology without robust contingency plans, the more vulnerable we become. This makes it critical to take notice, back up essential data, and loosen the strings of dependency on centralized systems before it’s too late.



what solutions are AUTHORITIES SUGGESTING?

During the Cyber Polygon exercises organized by the World Economic Forum (WEF) containing many other big players like the IBM, the aim of these gatherings are to identify the problems, alongside finding solutions. Here are some solutions that have been discussed under the topic of potential cyberattack threats:


  1. Controlled and Phased Reactivation of Services:

    After a cyber-induced shutdown, restoring systems too quickly can lead to infrastructure overload and cascading failures. Cyber Polygon emphasized the importance of a phased and coordinated recovery process to ensure stability during reactivation.


    Phased reactivation allows critical systems like energy grids, healthcare networks, and financial services to stabilize before non-essential services are restored. This prevents widespread failure. Discussions also explored the possibility of temporarily restricting access to certain services—including internet connectivity or public platforms—to manage demand and protect the integrity of essential systems during recovery. While this was not an explicit recommendation, it was acknowledged as a potential necessity in extreme scenarios.


  2. Clear Public Communication to Prevent Panic:

    Public trust is crucial during a cyber crisis. The exercises underscored the dangers of misinformation and the erosion of institutional confidence during such events. Transparent communication protocols are essential for managing public perception and providing accurate updates.


    Pre-established communication strategies were proposed as critical ideas for reducing panic, avoiding chaos, and maintaining societal order. Participants suggested leveraging centralized channels for messaging, potentially in partnership with major platforms, to counteract misinformation. They also noted that controlling access to certain digital platforms temporarily—such as social media—might be necessary to prevent the spread of panic-inducing rumors. This raised concerns about overreach but was framed as a last-resort measure to maintain stability during high-stakes crises.


  3. Prioritization of Services During Resource Constraints:

    In resource-limited situations during a cyber crisis, identifying and prioritizing critical infrastructure is vital. Cyber Polygon highlighted the necessity of frameworks to allocate resources effectively, ensuring the continuity of essential services such as hospitals, emergency response, and utilities.


    Prioritization frameworks were discussed ensure resources like bandwidth, power, and cybersecurity defenses are allocated to sectors critical for societal survival. Some proposals suggested limiting access to non-priority digital services, such as recreational internet use or non-essential streaming platforms, to conserve resources for vital systems. This idea, while practical, sparked discussions about balancing operational priorities with public acceptance.


From the lens of these powerful organisations and government agencies, having an idea on what can be done in the event of these manifested problems can be a helpful reference point. A notable example of these simulations providing good use was the ideas proposed in the event 201 virus pandemic simulation by the WEF, containing key recommendations and frameworks discussing vaccine distribution, testing and surveillance, mandatory healthcare measures, combating mis/disinformation and establishing global coordination. Helpful can be considered a subjective word for some.


how to mitigate the impact of a Cyber Pandemic or Data Outage


physical:

Before worrying about backing up digital information, the absolute priority during a cyberattack or power outage should be physical survival. Water, non-perishable food, cash, and basic supplies will be more important than anything else. Below in this article I have also written some tips with some other additional solutions that should make preparation easier. While you still have access to the internet and other services, it is recommended to ensure you've stocked up on basic survival items, which should include:

  • Water storage and filtration systems

  • Non-perishable food (canned goods, dried foods)

  • Medical supplies and first-aid kits

  • Off-grid solutions like solar chargers or hand-crank radios

  • Backup communication tools (e.g., walkie-talkies, emergency radios)


digital: self sustainment resources

For many people the internet is the primary source for retrieving information, including data relating to our sustainment, whether that be books and articles on farming, water preservation, cooking, building and more. Unlike the process of backing up your personal data. like pictures, passwords and contacts, it can be overwhelming trying to think what resources and topics would be helpful to backup for a scenario where you don't have the internet at hand. To tackle this problem, I founded Project Self Sustainment, which is a free, ever-expanding database containing over 2,000 books sourced from the internet orientated around self-sustainment. The topics covered include, but are not limited to:

  • Engineering: Technology, Electrical, Hydraulic systems

  • Agriculture: Farming, livestock management

  • Health: Food, water, medical care, and emergency practices

  • Crafts: Cooking, sewing, domestic skills

  • Survival: Techniques for self-sufficiency and shelter

  • Miscellaneous: Transportation, recreation, environmental studies


Poster for Project Self Sustainment


Scarcity corresponds to value, and in a world where we can no longer go online, this information will be invaluable. Having local, decentralized data ensures you're not dependent on monopolistic infrastructures during a cyber or grid shutdown.


You can download the resources from the project page here, and by storing this information locally, you gain access to critical knowledge when digital systems fail. This is how we can reduce our dependence on centralised systems and strengthen our resilience in the face of potential crises.


digital: personal resources

In addition to maintaining a decentralized local knowledge base, it’s worth reflecting on other forms of personal data that may be valuable, including:

  1. Personal Essentials:

    • Digital copies of ID documents (e.g., passports, driver's license)

    • Financial records, tax information, and insurance documents

    • Secure storage for passwords (consider an encrypted offline password manager)

    • If you have the storage: movies, books, music (you can search websites that allow you to download your music playlists from iTunes or Spotify).

  2. Business & Professional Data:

    • Customer data, transaction history, and business contracts

    • Intellectual property (documents, patents, research)

    • Employee data and payroll info

  3. Critical Software:

    • Backup copies of all essential software for your work or personal systems

    • System configurations and encryption keys

  4. Communication and Contacts:

    • Important contact lists, especially if you rely on online communication systems

    • Alternate email systems or tools that work offline

  5. Supply Chain & Operational Plans:

    • If you run a business, document your supply chains and vendors

    • Have contingency plans in place for food, water, and energy sources if you’re self-sufficient


exercise local collaboration

In a crisis, local cohesion is crucial. You don’t want to be isolated during such an event; instead, it’s essential to build strong connections with those around you. This doesn’t mean donating all your food or resources, but rather offering reasonable support and working together to create a self-sustaining environment. Share your skills and information with your neighbors, family, and friends. Everyone has something to offer—who knows, the people living next to you may be even more prepared than you! In these situations, collaboration is key. Progress and minimizing the impact are achieved more effectively together than by facing these challenges alone.


USE TECHNOLOGY TO MAKE organisation easier

In times like these, organizing your information can become a complex and frustrating task. Thankfully, AI tools and online platforms can make the process much smoother and more efficient.


Here are some ways you could use AI to simplify your research and data organisation:

  • Shopping: Looking for the "best" item when shopping can be time-consuming. I often copy and paste product pages and ask AI to break them down to help me make faster decisions. For example: Why is one product better? Why is this one cheaper? AI can quickly analyze these details.

  • Learning: Don’t know much about radio communication or water filtration? AI can help! You can ask AI to give you quick breakdowns of topics like how water filtration works, common brands, and what you need to maintain clean water for a certain amount of time. Have a budget? AI can organize this information and give you answers in seconds.

  • Data Organization: AI can help create efficient workflows, track important documents, and even automate tasks that would normally require hours of manual effort.

  • What else?: Ask AI to make a list of important items you need for self-sustainment and which applications can make the process easier. It’s a tool designed to make things easier—so why not use it to ask how it can help? AI knows what it's best at and can tailor its assistance to suit your needs.


These are some examples of platforms you could use for research and support:

  • Reddit:

    • Crowdsourced Knowledge: Tap into niche communities where people share insights, tips, and recommendations.

      Real-Life Reviews: Access unbiased feedback on products, tools, and strategies directly from users.

      Expert Opinions: Engage with enthusiasts and professionals who can answer specific questions or offer detailed advice.

      Searchable Content: Find existing threads on almost any topic for a quick dive into discussions or detailed research.

  • Telegram channels:

    • Curated Content: Subscribe to topic-specific channels for guides, tips, and updates relevant to your needs.

    • Real-Time Alerts: Receive instant notifications on deals, tech news, and strategies for self-sustainment or research.

    • Community Interaction: Join discussion groups linked to channels to ask questions, share insights, and exchange ideas.

    • Broad Range of Topics: From prepping and survival tips to product reviews and technology news, Telegram has it all.


  • Discord channels

    • Organized Discussions: Join servers with dedicated channels for specific topics like product reviews, guides, or troubleshooting.

    • Live Collaboration: Get real-time feedback or help from community members through voice and text chats.

    • Tools and Features: Utilize integrated bots to track deals, analyze products, or automate workflows.

    • Diverse Communities: Engage with tech enthusiasts, DIY hobbyists, or survival experts in an interactive environment.



aim to not be driven by fear

Lastly, and this is critical—do not approach this information and these scenarios with fear. The worst thing you can do is let fear guide your actions. From past events, we've seen how fear is used as a tool to manipulate and distort discernment. This whole preparedness thing might feel overwhelming at first, but take a moment to step back and recognize that at least you've come across this information now, and not at a point in time where it might be too late. Be prepared, but don’t act from a place of panic. Fear clouds judgement and only makes things worse. It creates ripple effects that impact the wellbeing of those around you and can spread like wildfire. Stay calm, stay aware, and work together with your community. Preparedness is about resilience, not fear.


Thanks for reading,


Mohan


[1]:





Project Self Sustainment

Mitigating digital threats by delivering a community-driven project decentralising essential knowledge, giving people the tools and opportunities to secure crucial information and build a self-sustaining future independent of centralised systems globally. 

INFINITE POTENTIAL

LEGAL DISCLAIMER: ALL CONTENT AND COMMENTS ARE FOR INFORMATIONAL PURPOSES ONLY AND DOES NOT REPRESENT EXPERT ADVICE

bottom of page