Amazon Web Services (AWS) has revealed plans to invest £8 billion into the construction, operation, and maintenance of data centres across the UK over the next five years.
The project is expected to contribute £14 billion to UK GDP before 2028, and support more than 14,000 jobs within the data centre supply chain, including construction, engineering, and telecoms.
AWS has spent £3 billion in development in the UK since 2020 to meet the growing demand from customers. This has supported an average of 6,000 full time jobs at local business level. The total impact of cloud computing services in the UK accounted for over £42 billion in 2023 - over 1.6% of GDP.
Digital economySurveys suggest that cloud computing services have saved small businesses money and allowed them to compete with larger companies by giving them access to the same technologies.
Tanuja Randery, Vice President and Managing Director, Europe, Middle East & Africa (EMEA) at AWS, said: “The next few years could be among the most pivotal for the UK’s digital and economic future, as organisations of all sizes across the country increasingly embrace technologies like cloud computing and AI to help them accelerate innovation, increase productivity, and compete on the global stage.“
The cloud infrastructure market is dominated by three major firms; AWS, Microsoft, and Google. In 2023, an investigation into the supply of public cloud infrastructure services in the UK indicated that AWS may have engaged in anti-competitive behaviours which could have disadvantaged UK customers and businesses.
It’s not clear how this new investment will affect the UK market - but the final decision is expected in April 2025.
More from TechRadar ProChinese state-sponsored threat actor Mustang Panda (also known as LuminousMoth, Camaro Dragon, HoneyMyte, and more), has been found launching malware campaigns against high value targets, including government agencies in Asia.
The group used a variant of the HIUPAN worm to deliver PUBLOAD malware into the networks of its targets via removable drives. The HIUPAN worm moved all its files into a hidden directory to obscure its presence, and left only one seemingly legitimate file visible ("USBConfig.exe") to trick the user.
The PUBLOAD tool was used as the primary control for the campaign, used to exfiltrate data and send to the threat actor’s remote server. PTSOCKET was often used as an alternative data extraction tool.
A familiar storyAn investigation by TrendMicro outlines the advancement in the malware deployment from Mustang Panda, especially in the use against military, government, and education agencies in the APAC region.
This is a change from the recent reports the organization was using WispRider variants to execute similar DLL sideloading techniques through USB drives. The previous campaign is said to have infected devices around the world, including in the UK, Russia, and India.
The group was also linked to a spear phishing campaign in June of this year, demonstrating its capabilities in exploiting Microsoft’s cloud services and leveraging multi-stage downloaders. The group remains highly active in the cyber landscape, and looks set to continue for the foreseeable future.
This is one of many suspected Chinese state-sponsored attacks in recent times, with campaigns against a range of targets, including Russian government devices compromised by phishing attacks.
Via BleepingComputer
More from TechRadar Pro