Global State of Cyber Warfare (2023–2024)
Cyber warfare has escalated into a persistent global threat, with both nation-states and non-state actors engaging in offensive cyber operations. Over the past two years, cyber attacks have been closely intertwined with geopolitical conflicts and criminal activity. For example, Russia's war on Ukraine has been accompanied by waves of disruptive hacks and data-wiping malware, making 2022 the worst year on record for destructive cyberattacks in any single country. At the same time, financially motivated hackers have inflicted damage on critical infrastructure, blurring the line between cybercrime and state-sponsored attacks. No region has been immune – North America, Europe, Asia, the Middle East, Africa, and Latin America have all faced major cyber incidents targeting government agencies, militaries, infrastructure, and private sectors.

by Andre Paquette

The Evolution of Cyber Threats
The landscape of digital security has transformed dramatically, with attacks growing in sophistication and impact across multiple domains:
1
Espionage Focus
State-sponsored attackers pivoted away from high-volume destructive attacks in favor of stealthy espionage campaigns against government, critical infrastructure, and policy targets. These operations often persist undetected for months or years, with the 2020-2021 SolarWinds breach affecting over 18,000 organizations including multiple US government agencies. Advanced Persistent Threats (APTs) from China, Russia, and North Korea have developed sophisticated capabilities to extract intellectual property and state secrets while maintaining operational security.
2
Infrastructure Targeting
Hostile actors increasingly infiltrate energy grids, telecom networks, and even space assets to establish persistent footholds while evading detection. The 2021 Colonial Pipeline attack demonstrated vulnerabilities in critical infrastructure, causing fuel shortages across the Eastern United States. Similar campaigns have targeted water treatment facilities, nuclear power plants, and healthcare systems - creating pre-positioned capabilities that could cause widespread disruption during conflicts. Industry reports indicate a 300% increase in infrastructure-focused attacks since 2019.
3
Sabotage Operations
Some governments continue to use cyber means for sabotage and information warfare, as seen with Russia's hacks against Ukraine's networks which even spilled over to disrupt satellite communications across Europe. These operations have evolved from the earlier NotPetya and WannaCry attacks to become more targeted and strategically timed. Recent campaigns have synchronized cyber operations with kinetic warfare, targeting logistics systems, communications infrastructure, and command-and-control networks to multiply battlefield advantages. According to security researchers, "wiper" malware deployments increased by 400% during major geopolitical conflicts.
4
Non-State Actor Involvement
Hacktivist and criminal groups have played a prominent role, from pro-Ukrainian hackers leaking Russian data to pro-Russian groups conducting disruptive DDoS attacks on Western organizations. Criminal syndicates like Conti, Lockbit, and REvil have professionalized ransomware operations, creating Ransomware-as-a-Service models that lower barriers to entry. Meanwhile, hacktivist collectives including Anonymous have declared "cyber war" against state adversaries, leaking over 20TB of sensitive data and defacing hundreds of websites. This democratization of cyber capabilities creates unpredictable dynamics where non-state actors can significantly impact international relations and critical services.
These evolving threat vectors require organizations and nations to continuously adapt defensive strategies and enhance resilience across public and private sectors.
The Blurring Lines Between State and Criminal Activity
Beyond State-vs-State
Cyber warfare is no longer confined to state-against-state activity; financially motivated hackers can inadvertently spark international crises, and states sometimes outsource operations to criminal proxies.
The involvement of non-state actors adds complexity to the threat landscape. Ransomware gangs and "cyber mercenaries" have targeted hospitals, pipelines, and governments worldwide for profit or political motives.
These actors operate with varying degrees of sophistication, sometimes rivaling nation-state capabilities. Their activities create a chaotic environment where attribution becomes increasingly difficult, as the technical signatures may resemble those of state actors.
The rise of "hacktivism-as-a-service" further complicates this dynamic, allowing ideologically motivated groups to rent advanced capabilities they couldn't develop independently.
Case Study: Costa Rica Crisis
In an unprecedented case in 2022, the Conti ransomware cartel – a private criminal group – crippled government services in Costa Rica so severely that a national state of emergency was declared.
Such incidents demonstrate how cyber warfare is evolving beyond traditional boundaries, with financially motivated hackers sometimes causing international incidents that have geopolitical implications.
The Costa Rica attack paralyzed tax collection, imports/exports, and healthcare systems for weeks. President Rodrigo Chaves had to take the extraordinary step of declaring a "national emergency" – a mechanism typically reserved for natural disasters or military threats.
Similar patterns emerged in the 2017 NotPetya attack, initially targeting Ukraine but causing over $10 billion in global damages to shipping giants, pharmaceutical companies, and food producers across 65 countries – demonstrating how cyber incidents can rapidly escalate beyond their intended scope.
State Use of Criminal Tools
Nation-state adversaries like Russia and Iran have increasingly leveraged cybercriminal tools and personnel to enhance their campaigns, erasing traditional boundaries between espionage and cybercrime.
This strategic shift allows states to maintain plausible deniability while still achieving their objectives through cyber means, making attribution and response more challenging.
Intelligence agencies now regularly observe the phenomenon of "state-sponsored ransomware," where government hackers deploy encryption malware typically associated with criminals. These operations serve dual purposes – generating revenue while creating disruption in targeted nations.
The recruitment of skilled hackers from criminal forums provides states with talent pools that can be activated for specific campaigns without the bureaucratic constraints of traditional military operations. This "cyber militia" approach enables rapid scaling of offensive capabilities while maintaining an arm's length relationship with the actual perpetrators.
The Attribution Challenge

1

2

3

4

1
Technical Analysis
Examining code, infrastructure, and tactics to identify patterns
2
False Flag Operations
Attackers deliberately obscure their identity or impersonate others
3
International Cooperation
Nations sharing intelligence to build stronger attribution cases
4
Public Attribution
Formal statements assigning responsibility to specific actors
Challenges in attribution – identifying who is behind an attack – persist due to false flags and the anonymity of cyberspace. For instance, researchers uncovered a "false flag" operation in which a hacktivist group pretended to be China-based APT27 during a cyber assault on Taiwan, misleading observers about the attack's origin. This highlights the difficulty of tracing attacks when threat actors deliberately obscure their identity.
Technical attribution often relies on identifying an attacker's "fingerprints" – unique code fragments, infrastructure patterns, or operational tactics. However, sophisticated actors regularly change their tools and techniques to avoid detection. The 2020 SolarWinds breach demonstrated this challenge, with attackers maintaining persistence for months while modifying their approach to evade security monitoring.
Geopolitical considerations further complicate attribution decisions. Nations must weigh diplomatic implications before publicly naming attackers, as accusations without conclusive evidence can escalate tensions. The 2017 WannaCry ransomware attack, which affected over 200,000 computers across 150 countries, illustrated this dilemma – while eventually attributed to North Korea, initial attribution remained cautious due to the potential consequences of misidentification.
Legal frameworks for cyber attribution also remain underdeveloped. Unlike physical warfare, international norms for establishing responsibility in cyberspace are still evolving. The lack of standardized evidentiary requirements makes building consensus around attribution findings challenging, even among allies. This gap underscores why coordinated attribution statements from multiple nations have become increasingly important for establishing credibility in naming cyber adversaries.
Key State-Sponsored Actors: Russia
Fancy Bear (APT28)
GRU military intelligence unit focusing on intelligence theft, targeting NATO networks, diplomats, and supply chains. Known for sophisticated phishing campaigns against Eastern European diplomats and hack-and-leak operations. Notable operations include the 2016 Democratic National Committee hack, the World Anti-Doping Agency breach, and targeting of defense contractors across multiple continents. They employ custom malware like X-Agent and X-Tunnel, and frequently update their tactics to evade detection while conducting espionage that aligns with Russian strategic interests.
Cozy Bear (APT29)
SVR intelligence service unit conducting stealth espionage, responsible for the SolarWinds Orion breach and continued intelligence collection from NATO governments. Specializes in long-term persistent access to high-value targets. Their SolarWinds operation compromised over 18,000 organizations including multiple US government agencies. They excel at "living off the land" techniques, using legitimate administration tools to avoid detection while maintaining access for years. Recent campaigns have targeted diplomatic missions, think tanks, and healthcare organizations researching COVID-19 vaccines.
Sandworm (Unit 74455)
GRU unit known for sabotaging critical infrastructure, including Ukraine's power grid attacks in 2015, 2016 and an attempt in 2022. Deployed data wipers that destroyed countless systems in Ukraine and knocked out satellite modems across Europe. Their NotPetya malware caused over $10 billion in damages globally, making it the costliest cyberattack in history. They've also targeted Olympic organizations with the Olympic Destroyer malware and conducted operations against chemical weapons investigators. Sandworm represents Russia's most aggressive cyber capability, willing to cause real-world physical effects through digital means.
Hacktivist Fronts
Russia leverages hacktivist groups like KillNet and criminal ransomware groups to conduct attacks on its behalf, providing plausible deniability while still achieving strategic objectives. KillNet has launched DDoS campaigns against NATO countries supporting Ukraine, targeting government websites, airports, and financial institutions. The Conti ransomware group has publicly aligned with Russian interests during the Ukraine conflict. Russian intelligence services provide technical support, targeting information, and safe harbor to these groups while maintaining arms-length relationships. This "hybrid threat" model allows Russia to conduct operations that would be too provocative if attributed directly to state actors.
Russia's cyber operations reflect its geopolitical strategy, with different units assigned distinct but complementary roles. Military intelligence units focus on disruptive attacks, while foreign intelligence services prioritize long-term espionage. Together, these actors form a sophisticated ecosystem that blends traditional espionage with modern cyber capabilities, allowing Russia to project power globally while maintaining varying degrees of deniability.
Key State-Sponsored Actors: China

1

2

3

4

1
Intelligence Collection
Sophisticated worldwide espionage campaigns targeting government, military, and private sector entities
2
Critical Infrastructure Access
Pre-positioning in power, communications, and transportation systems for potential future disruption
3
Supply Chain Compromise
Software and hardware supply-chain attacks to gain widespread persistent access across sectors
4
Influence Operations
Large-scale disinformation and propaganda campaigns to shape global opinion and political decisions
Chinese state-sponsored groups have conducted extensive cyber espionage worldwide, seeking military, political, and commercial secrets. In the past two years, China's cyber units (often labeled APT40, APT41, APT27, APT31, etc.) have carried out "sophisticated worldwide intelligence collection campaigns," according to Microsoft. Chinese hackers have been caught infiltrating government agencies across Asia and targets in Europe, Africa, and the Americas.
Operation CuckooBees, attributed to APT41, exfiltrated hundreds of gigabytes of intellectual property and sensitive data from global technology companies. Meanwhile, Volt Typhoon hackers maintained persistent access in U.S. critical infrastructure networks for at least five years, according to CISA and FBI reports. The Ministry of State Security (MSS) coordinates many of these efforts, leveraging both government personnel and contracted civilian hackers.
China's cyber strategy represents a comprehensive approach that blends traditional espionage with advanced persistent threats. Their tactics have evolved from merely stealing intellectual property to establishing long-term presence in systems critical to national security. Recent campaigns have shown increased sophistication, with hackers leveraging zero-day vulnerabilities and employing advanced obfuscation techniques to avoid detection, making attribution increasingly challenging for security researchers.
Key State-Sponsored Actors: North Korea
1
1
Financial Theft
Stealing hundreds of millions in cryptocurrency to fund weapons programs, targeting exchanges and financial institutions worldwide with sophisticated tactics and persistent campaigns
2
2
Ransomware Deployment
Attacking healthcare, critical infrastructure, and other industries as a form of illicit income, with destructive payloads capable of crippling entire organizations
3
3
Supply Chain Attacks
Compromising software providers to gain access to multiple targets simultaneously, exploiting trusted relationships and circumventing traditional security measures
4
4
Espionage Operations
Spying on South Korean and U.S. defense sectors, researchers, and diplomatic entities to gain military intelligence and strategic advantages in geopolitical tensions
Isolated but highly aggressive in cyberspace, North Korea employs cyber attacks as a means to generate revenue and threaten its adversaries. Lazarus Group (associated with North Korea's Reconnaissance General Bureau) is infamous for stealing hundreds of millions in cryptocurrency to fund Pyongyang's weapons programs. Unlike other nation-state actors, North Korea's cyber operations have a unique dual focus on both espionage and financial gain.
North Korean hackers have demonstrated remarkable technological adaptability despite the country's limited connectivity. Their WannaCry ransomware campaign in 2017 infected over 200,000 computers across 150 countries, causing billions in damages. More recently, groups like Kimsuky and APT38 have targeted COVID-19 vaccine research and financial systems, respectively, showing both the breadth and specialization of North Korea's cyber capabilities.
Cybersecurity experts note that North Korea's cyber army comprises an estimated 6,000 hackers, many trained in China and Russia before operating from countries like Belarus, China, India, Malaysia, and Russia to mask their origins. This distributed approach makes attribution challenging and enables North Korea to maintain plausible deniability while continuing aggressive operations that would otherwise risk military retaliation.
Key State-Sponsored Actors: Iran
Increased Sophistication
Iranian state-sponsored hackers have markedly increased their sophistication and aggression, using "increasingly sophisticated tradecraft," including attacking cloud infrastructure and quickly exploiting newly disclosed vulnerabilities. Groups such as APT33 (Elfin), APT34 (OilRig), and APT35 (Charming Kitten) have demonstrated enhanced capabilities in recent years, often adapting techniques observed from Russian and Chinese threat actors. Their operations frequently target critical infrastructure, defense organizations, and financial institutions across the Middle East, Europe, and North America.
Notable Disruptive Attacks
In 2022, Iranian hackers carried out a notable disruptive attack on Albania's government – deploying wiper malware on Albanian government servers, which destroyed data and paralyzed services as retaliation for Albania hosting an Iranian dissident group. This attack was significant enough to trigger NATO consultations and prompted Albania to sever diplomatic ties with Iran. Other notable operations include the 2021 attempts to disrupt Israeli water infrastructure, attacks on multiple U.S. government agencies, and persistent campaigns targeting Middle Eastern energy companies and telecommunications providers.
Destructive Capabilities
Iran's toolkit includes destructive malware (recall the Shamoon wiper deployed on Saudi Aramco in 2012) and more recently ransomware masquerades (e.g., the "DarkCoders" wiper attack on Albanian systems was posed as ransomware). The notorious Shamoon attack destroyed data on over 30,000 Saudi Aramco workstations, demonstrating Iran's willingness to conduct highly destructive operations. Iranian actors also deploy custom-built tools like DUSTMAN, ZeroCleare, and Meteor wiper malware, specifically designed to render systems inoperable. These destructive attacks often align with geopolitical tensions and appear intended to signal Iran's cyber capabilities to adversaries.
Disinformation Operations
Iranian APTs also engage in disinformation and influence operations, and frequently use spear-phishing to steal credentials from targets like journalists, policy experts, and dissidents abroad. Operation "Endless Mayfly" demonstrated Iran's sophisticated approach to spreading false narratives through inauthentic news sites and social media campaigns. These operations often focus on shaping regional narratives, particularly regarding Saudi Arabia, Israel, and U.S. policies in the Middle East. Iranian influence operations intensify during election cycles in Western countries and during periods of regional conflict. They maintain networks of inauthentic accounts across Twitter, Facebook, and Telegram to amplify preferred messages and coordinate harassment of Iranian dissidents living abroad.
Other State Actors in Cyberspace
United States
The U.S. Cyber Command has executed "hunt forward" missions to help allied nations find and eradicate intruders on their networks (such as operations in Ukraine and Estonia), demonstrating its global reach and defensive capabilities.
Western intelligence agencies (NSA, GCHQ, etc.) are known to develop advanced cyber tools (e.g. the NSA's EternalBlue exploit leaked in 2017 was later repurposed by both state and criminal actors including WannaCry and NotPetya).
The Equation Group, widely believed to be linked to the NSA, has developed some of the most sophisticated malware in history, including Stuxnet which damaged Iran's nuclear program in 2010 through an unprecedented attack on industrial control systems.
U.S. cyber strategy has evolved to include "persistent engagement" and "defend forward" doctrines, allowing preemptive operations against adversaries before they can launch attacks against American assets.
Israel
Israel has reportedly carried out cyber strikes to disable Iranian critical systems (e.g. a 2020 attack on Iran's Natanz nuclear facility and more recent hacks on Iranian fuel distribution networks).
In late 2023, Israeli-linked hackers disrupted 70% of Iran's gas stations via a cyberattack in retaliation for Iranian military actions, demonstrating the ongoing cyber conflict between these regional rivals.
Unit 8200, Israel's elite military intelligence unit, is renowned for its technical capabilities and has been compared to the NSA in terms of sophistication. Many Israeli cybersecurity firms have been founded by former Unit 8200 members.
The "Stuxnet" worm, believed to be a joint U.S.-Israeli operation, represented a watershed moment in cyber warfare when it physically damaged Iranian centrifuges in 2010, proving that cyberattacks could cause real-world physical damage.
Regional Powers
Regional powers like Vietnam (APT "OceanLotus"), Pakistan, and India are also active in cyber espionage within their spheres, though on a smaller scale.
These nations typically focus their cyber operations on regional rivals and specific strategic interests rather than global campaigns, often targeting neighboring countries' government, military, and economic sectors.
North Korea has developed significant cyber capabilities as an asymmetric tool to overcome conventional military disadvantages and evade sanctions. The Lazarus Group, linked to North Korea, has conducted operations ranging from bank heists (stealing over $81 million from Bangladesh Bank) to the destructive WannaCry ransomware campaign.
Turkey has increased its cyber capabilities in recent years, with its operations primarily focusing on Kurdish groups and regional adversaries. Turkish hackers have been observed targeting government agencies and energy companies in neighboring countries.
Non-State Actors: Ransomware Gangs
1
Initial Compromise
Gaining access through phishing, exploiting vulnerabilities, or purchasing access from brokers. Groups like LockBit frequently exploit unpatched systems, while Clop has leveraged zero-day vulnerabilities in file transfer applications. Many groups now rely on Initial Access Brokers who specialize in network infiltration.
2
Network Reconnaissance
Mapping the network to identify valuable data and critical systems. Attackers may dwell in networks for days or weeks, using legitimate tools like PowerShell and WMI to avoid detection. They search for backup systems to disable, domain controllers to compromise, and high-value data repositories.
3
Data Exfiltration
Stealing sensitive information before encryption for "double-extortion." Groups like BlackCat (ALPHV) have stolen terabytes of customer data, intellectual property, and financial information. Some groups have expanded to "triple-extortion" by also threatening victims' customers or business partners with data exposure.
4
Encryption and Ransom
Deploying ransomware to encrypt systems and demanding payment for decryption. Average ransom demands exceeded $1.5 million in 2023. Many gangs operate leak sites on the dark web where they publish stolen data from non-paying victims. Some groups provide "customer service" portals to facilitate payment and decryption.
Ransomware remains one of the most disruptive cyber threats globally. These criminal groups deploy malware that encrypts data and extorts victims, and many have adopted a "double-extortion" model – stealing sensitive data and threatening to leak it if ransom isn't paid. LockBit, BlackCat (ALPHV), Clop, Hive, Black Basta, and the now-defunct Conti are among the most prolific ransomware operations of the past two years.
The impact of these attacks has been devastating across sectors. Healthcare has been particularly vulnerable – a 2023 attack on Change Healthcare disrupted medical claims processing for weeks nationwide. Critical infrastructure has also been targeted, with Colonial Pipeline paying $4.4 million after a 2021 attack caused fuel shortages across the Eastern US. Many ransomware gangs operate under a Ransomware-as-a-Service (RaaS) model, where developers lease their malware to affiliates who conduct attacks and share the profits. Law enforcement has achieved some successes – the FBI's takedown of Hive's infrastructure in 2023 prevented over $130 million in ransom payments – but new groups continue to emerge as others are disrupted.
Non-State Actors: Financial Cybercrime Groups
$600M
Ronin Network Theft
Stolen by North Korean Lazarus Group in 2022
$100M
Horizon Bridge Hack
Another major cryptocurrency heist in 2022
41%
BEC Attack Increase
Business Email Compromise reached all-time high in 2023
$130M
Prevented Ransoms
FBI's 2023 takedown of Hive infrastructure saved victims
Apart from ransomware, cybercriminals engage in bank heists, payment fraud, and cryptocurrency theft. Business Email Compromise (BEC) schemes – where attackers spoof or hack corporate email to trick employees into sending large payments – have surged globally, causing billions in losses. Microsoft observed an all-time high in BEC activity in 2023.
Financially motivated cybercrime has evolved dramatically in sophistication and scale. The Lazarus Group, linked to North Korea's government, has stolen an estimated $3 billion in cryptocurrency since 2017, funding the regime's weapons programs. Meanwhile, Eastern European groups like FIN7 have pivoted from payment card theft to ransomware and BEC operations, demonstrating the fluid nature of criminal enterprises.
Cryptocurrency platforms remain prime targets due to their high value and sometimes vulnerable infrastructure. Beyond the headline-grabbing hacks shown above, dozens of smaller thefts occur monthly, with attackers exploiting smart contract vulnerabilities, flash loan attacks, and insider threats. Law enforcement agencies have improved their cryptocurrency tracing capabilities, but cybercriminals continually develop new money laundering techniques, including the use of mixing services and privacy coins to obscure transaction trails.
Non-State Actors: Hacktivists and Patriotic Hackers
Anonymous Collective
Declared "op cyberwar" on Russia in early 2022, claiming credit for defacing Russian websites and leaking data. This decentralized group has a history of politically motivated attacks dating back to 2008, operating under the motto "We are Legion." Their tactics include website defacement, doxxing, and distributed denial-of-service (DDoS) attacks against targets they deem corrupt or oppressive.
KillNet
Pro-Russian group launching DDoS attacks on NATO countries' government and healthcare websites. Formed in early 2022, KillNet has targeted critical infrastructure in countries supporting Ukraine, including hospitals, airports, and financial institutions. They operate a "DDoS marketplace" where they coordinate volunteers through Telegram channels to amplify their attack capabilities.
Anonymous Sudan
Emerged in 2022, conducting DDoS attacks in support of Islamist or pro-Russian causes. Despite their name suggesting African origins, cybersecurity researchers suspect the group may be a false flag operation with ties to Russian interests. They've targeted Microsoft services, Western media outlets, and government websites in countries opposing Russian foreign policy, demonstrating sophisticated attack methodologies.
Guacamaya
Hacktivist network in Latin America that leaked massive troves of emails from military and police organizations. Their name means "macaw" in several indigenous languages, reflecting their regional focus. The group has exposed government corruption, environmental crimes, and corporate misconduct across Mexico, Chile, Colombia, El Salvador, and Peru, publishing over 10 terabytes of classified documents since 2022.
Hacktivism represents a growing trend where politically motivated individuals with technical skills form loose collectives to advance ideological agendas. Unlike state actors or cybercriminals, these groups are primarily motivated by political or social causes rather than financial gain or strategic national interests. Their operations often blur the lines between digital protest and cyberwarfare, creating challenges for attribution and response.
Recent years have seen increased "patriotic hacking," where independent actors align with national interests during geopolitical conflicts. These groups can provide nations with plausible deniability while still advancing strategic objectives in cyberspace, further complicating an already complex threat landscape.
Cyber Mercenaries and Privateers
Exploit Brokers
Companies and individuals selling zero-day vulnerabilities to highest bidders, creating a marketplace for digital weapons. These brokers operate in legal gray areas, sometimes selling to both defensive security researchers and offensive actors simultaneously. Prices for high-value exploits can reach millions of dollars, incentivizing researchers to sell privately rather than disclose vulnerabilities.
Spyware Vendors
Firms like NSO Group whose "Pegasus" malware has been used by governments to surveil journalists and dissidents. These companies claim their tools are only sold to legitimate governments for fighting terrorism and crime, but investigations have revealed widespread abuse targeting civil society. Other vendors include Candiru, Cytrox, and Hacking Team, all providing sophisticated surveillance capabilities.
State Contractors
Security services outsourcing operations to private contractors for plausible deniability. These arrangements allow governments to conduct cyber operations while maintaining official distance from controversial activities. Contractors often employ former intelligence officers and military personnel with advanced technical skills, creating a revolving door between public and private sectors that complicates accountability.
Criminal Collaborators
Nation-states hiring criminal hackers for specific operations, blurring lines between state and criminal activity. This "patriotic hacking" model has been observed in several countries where criminal groups receive protection in exchange for occasionally serving state interests. These arrangements provide states with specialized skills and additional operational capacity while offering criminals sanctuary from prosecution.
A growing ecosystem of private companies and contractors offer offensive cyber capabilities to governments or highest bidders. The "cyber mercenary marketplace" is expanding unchecked and threatens to destabilize cyberspace by putting advanced tools in more hands. This commercialization of cyber weapons has accelerated the proliferation of sophisticated attack capabilities to countries that would otherwise lack such technical expertise.
International efforts to regulate this industry have struggled to gain traction. The Wassenaar Arrangement attempts to control exports of intrusion software, but implementation has been inconsistent. Meanwhile, the market continues to grow, with estimates valuing the offensive cyber tools industry at over $12 billion annually and rising. As these capabilities spread, the risk of escalation and miscalculation in cyberspace increases substantially.
Major Cyber Incidents: North America
Target sectors for cyber attacks in North America:
Government: 28%
Healthcare: 22%
Energy: 18%
Finance: 15%
Education: 10%
Other: 7%
The United States and Canada remain prime targets for both espionage and financially motivated attacks. In 2023, U.S. officials warned of unprecedented cyber threats to critical infrastructure, noting that nation-state hackers from China, Russia, Iran, and North Korea have all been active inside U.S. networks. A striking example was the discovery of "Volt Typhoon," a Chinese campaign to infiltrate U.S. electric utilities and telecom networks in Guam – likely to disrupt communications during a future crisis.
Major incidents have escalated in both severity and frequency. The 2021 Colonial Pipeline attack disrupted fuel supplies across the eastern seaboard, demonstrating how cyber attacks can have immediate physical consequences. SolarWinds represented one of the most sophisticated supply chain compromises in history, affecting thousands of organizations including multiple federal agencies. More recently, the MGM Resorts and Caesars Entertainment attacks showed how ransomware groups are targeting higher-profile victims with demands now regularly exceeding $10 million.
Healthcare remains particularly vulnerable, with hospitals facing a 650% increase in attacks since 2020. The attack on Scripps Health in San Diego forced the diversion of stroke and heart attack patients to other facilities. Meanwhile, academic institutions have seen targeted campaigns against research facilities, particularly those working on COVID-19 vaccines and other sensitive technologies. The University of California paid a $1.14 million ransom after attackers threatened to publish sensitive student data.
Government agencies at all levels face sophisticated adversaries. The 2020 compromise of the Treasury, Commerce, and Homeland Security departments highlighted the persistence of state-sponsored threats. Municipal governments have proven particularly vulnerable – cities like Baltimore, Atlanta, and New Orleans have spent tens of millions recovering from ransomware attacks that crippled essential services. The trend of "big game hunting" by ransomware groups shows no signs of slowing, with both infrastructure and data increasingly at risk.
Major Cyber Incidents: Europe
1
February 2022
Russian hackers knocked out Viasat's KA-SAT satellite network, disrupting communications across Ukraine and parts of Europe. This attack occurred just hours before the Russian invasion, crippling Ukrainian military communications and affecting internet service for thousands of Europeans.
2
July 2022
Iranian-sponsored hackers deployed ransomware and wipers on Albanian government networks, forcing Albania to shut down online services. The attack was so severe that Albania severed diplomatic relations with Iran - the first case of diplomatic ties being cut over a cyberattack.
3
November 2023
Denmark suffered its largest cyberattack when Russian hackers gained access to control systems of 22 power companies. Security analysts believe this was part of a broader campaign to test vulnerabilities in European critical infrastructure, potentially preparing for future disruptions.
4
December 2023
Russian hackers hit Ukraine's largest mobile provider Kyivstar, disrupting service to millions. The attack destroyed the core infrastructure of the company, wiping thousands of virtual servers and computers, and represented one of the most destructive telecom attacks in history.
Europe has been on the frontlines of cyber warfare, especially due to spillover from the Russia-Ukraine conflict. Ukraine itself experienced a campaign of cyber sabotage in coordination with Russia's invasion in February 2022. In the weeks surrounding the invasion, at least 9 distinct strains of wiper malware tore through Ukrainian government and private networks, an onslaught security experts said was unprecedented in scale.
The European Union has responded by strengthening its collective cyber defenses. The NIS2 Directive, implemented in 2022, expanded cybersecurity requirements across more sectors and introduced stricter enforcement measures. Meanwhile, NATO has declared cyberspace an operational domain alongside land, sea, and air, allowing the alliance to invoke Article 5 (collective defense) in response to severe cyberattacks. Despite these measures, European critical infrastructure remains highly vulnerable, with energy grids, financial systems, and healthcare networks experiencing thousands of attempted breaches each month.
Major Cyber Incidents: Asia-Pacific
China's Regional Operations
China's neighbors – such as Taiwan, Japan, India, and Southeast Asian nations – are under heavy cyber espionage pressure from Chinese APTs. In 2023, Chinese hackers breached Japan's aerospace agency JAXA and were found spying on several ASEAN governments through a sophisticated malware campaign dubbed "FunnyDream" that infected thousands of systems across Vietnam, Thailand, and Malaysia.
Chinese threat actors have targeted South China Sea stakeholders (e.g., maritime authorities in Vietnam and Malaysia) and conducted large-scale surveillance of the Uyghur diaspora. The APT40 group specifically focuses on countries involved in Belt and Road Initiative projects and has compromised maritime technology companies across Southeast Asia.
Australia reported in 2022 that Chinese state-sponsored hackers had infiltrated critical infrastructure networks, including power utilities and telecommunications companies. These intrusions established persistent access that could potentially be leveraged during future conflicts to disrupt essential services.
Taiwan Under Pressure
Taiwan faces persistent cyberattacks aimed at its government and critical industries; notably, around the high-profile Taiwan visit of U.S. Speaker Nancy Pelosi in August 2022, Taiwan experienced waves of DDoS attacks on government sites and even hacks that defaced 7-11 store displays with political messages. The presidential office website was knocked offline, and the foreign ministry reported a 23-fold increase in cyberattacks during this period.
Some of these were later suspected to be false-flag operations (hackers posing as Chinese patriotic groups to stoke fear). Taiwan's threat landscape is complicated by the presence of both state-sponsored actors and independent "hacktivists" with varying motivations.
In 2023, Taiwan's defense ministry detected a 70% increase in cyber intrusion attempts, with over 40 million suspicious activities blocked monthly. The island's semiconductor industry has become a prime target, with TSMC (Taiwan Semiconductor Manufacturing Company) reporting sophisticated attempts to steal intellectual property related to advanced chip designs and manufacturing processes.
North Korean Targeting
South Korea deals with an onslaught of North Korean cyber attacks, reportedly over a million intrusion attempts per day in 2023. Pyongyang's cyber units have breached South Korean defense and foreign ministry systems numerous times, with the notorious Lazarus Group infiltrating the South Korean military intranet in 2016 and stealing war plans.
North Korean hackers have also targeted financial institutions across Asia, including banks in multiple countries. The infamous Bangladesh Bank heist in 2016, which attempted to steal $1 billion, was attributed to North Korean actors. Similar attacks struck banks in Taiwan, the Philippines, and Vietnam between 2018 and 2022.
In recent years, North Korean hacking groups have expanded operations to target cryptocurrency exchanges throughout the region, successfully stealing an estimated $3 billion in digital assets since 2017. These operations serve as a crucial source of hard currency for the heavily sanctioned regime, with the stolen funds potentially supporting nuclear and ballistic missile programs.
The Asia-Pacific region represents a complex cyber battleground where espionage, financial theft, and geopolitical tensions intersect. With several major powers in close proximity and numerous territorial disputes, cyber operations have become an extension of broader regional competition. Industries particularly targeted include defense contractors, research institutions, and technology companies working on emerging technologies like artificial intelligence, quantum computing, and advanced semiconductor manufacturing.
Major Cyber Incidents: Middle East
Israeli Water Systems (2020)
Iran attempted to hack Israeli water treatment controls in April 2020, targeting chemical controllers in multiple facilities. The attackers reportedly tried to increase chlorine levels to dangerous amounts, which could have caused widespread poisoning or water shortages in the middle of a pandemic lockdown. Israel's cyber defense agencies detected and blocked the attempts before serious damage occurred.
Iranian Fuel Systems (2021)
Israel reportedly disrupted Iran's subsidized fuel distribution system in October 2021, causing widespread chaos at gas stations across the country. The cyber attack disabled the government-issued smart cards that many Iranians use to buy subsidized fuel, leading to long lines and social unrest. Digital displays at affected stations reportedly showed messages challenging the Supreme Leader's authority.
Albanian Government (2022)
Iran deployed sophisticated ransomware and wipers on Albanian government networks in July 2022, forcing the shutdown of digital services and government websites. The unprecedented attack was so severe that Albania severed diplomatic relations with Iran - the first case of a country cutting ties over a cyberattack. A second wave of attacks later targeted Albania's border control systems, creating additional disruption to critical services.
Iranian Gas Stations (2023)
Israel-linked hackers took down approximately 70% of Iran's gas station network in October 2023, disabling fuel pumps nationwide and displaying messages referencing Iranian Supreme Leader Khamenei. The highly coordinated attack affected around 4,300 gas stations and required weeks to fully restore services. The attack coincided with the anniversary of 2022 protests and occurred during heightened regional tensions following Hamas attacks on Israel.
Long-running geopolitical conflicts in the Middle East have spilled into cyberspace with high-impact attacks targeting civilian infrastructure. Iran and Israel are the primary cyber adversaries in the region, each accused of striking the other's critical infrastructure in what security experts call a "shadow war." These attacks represent a concerning evolution in cyber conflict, with both nations willing to target services that directly impact civilian populations. The ongoing cyber operations demonstrate how digital attacks have become integrated into broader regional strategy, with retaliatory cycles accelerating in both frequency and severity in recent years.
Beyond direct Iran-Israel confrontations, other significant cyber activities in the region include Saudi Arabia's ARAMCO being hit by the devastating Shamoon malware in 2012, Qatar News Agency being hacked to post fake news that triggered a diplomatic crisis in 2017, and ongoing surveillance campaigns targeting journalists, dissidents and human rights activists across multiple Middle Eastern countries.
Major Cyber Incidents: Africa
Kenya's e-Citizen Portal Attack
In July 2023, Kenya suffered a major incident when the "Anonymous Sudan" group (likely a front for Russian actors) launched a sustained DDoS campaign against Kenya's e-Citizen portal. This portal hosts thousands of government services, and the attack disrupted key services like payment systems (M-Pesa mobile money) and government service applications for days. The attackers claimed the attack was retaliation for Kenya's political stance, demonstrating how cyber attacks are increasingly used as geopolitical pressure tactics. The incident highlighted significant vulnerabilities in Kenya's digital infrastructure and prompted calls for increased investment in cybersecurity across East Africa.
South African Infrastructure Attacks
In South Africa, several high-profile ransomware attacks have occurred: Transnet (the port operator) was hit in 2021 causing port closures and disrupting supply chains across Southern Africa for weeks. In 2022–2023 ransomware struck South African government departments and companies, including the Department of Justice, leading to concerns about critical infrastructure protection. The economic impact was estimated in the millions of dollars, with some attacks linked to Eastern European cybercriminal groups. These incidents prompted South Africa to accelerate its implementation of the National Cybersecurity Policy Framework and establish a dedicated Critical Infrastructure Protection unit.
Financial Institution Targeting
African financial institutions and telecom providers have been prime targets for global cybercriminals due to their improving digital infrastructure coupled with security gaps. Banks in West Africa have been drained by sophisticated malware campaigns including "Silence" and "GCMAN" groups, with losses exceeding $85 million between 2020-2023. Nigeria's national oil company was hit by ransomware in 2023, disrupting fuel distribution. Mobile money systems, which serve as financial lifelines across the continent, have faced increasing attacks, with fraudsters targeting vulnerabilities in USSD protocols and exploiting social engineering techniques to compromise accounts in countries like Ghana, Kenya, and Tanzania.
Espionage Operations
African governments and the African Union have been victims of espionage – notably, China was accused of infiltrating the African Union's servers for years (a report in 2018 claimed servers in the AU headquarters were sending data to Shanghai nightly). The compromised systems reportedly contained sensitive diplomatic, commercial, and military information that could provide significant intelligence advantages. Additional reports identified state-sponsored APT groups targeting ministries of foreign affairs, defense contractors, and telecommunications companies across multiple African nations. These operations highlight Africa's strategic importance in global intelligence gathering and the need for sophisticated counter-intelligence capabilities. The continent has also seen North Korean threat actors like Lazarus Group specifically targeting financial institutions to circumvent international sanctions.
Major Cyber Incidents: Latin America
Costa Rica Ransomware Crisis (2022)
The Conti gang's attack effectively halted many government functions, from tax collection to health services, for weeks. This unprecedented attack led the government to declare a national emergency, highlighting the severe resilience gap in some Latin American IT infrastructure. The attackers demanded $10 million in ransom, targeting 27 government institutions including the Ministry of Finance and Ministry of Labor. The incident exposed critical vulnerabilities in Costa Rica's digital infrastructure and prompted a comprehensive national cybersecurity overhaul with assistance from the United States and international partners.
Guacamaya Leaks (2022)
The Guacamaya leaks exposed internal communications of military and police agencies across multiple countries, revealing surveillance practices and causing political fallout in Chile and Mexico. This was driven by hacktivists focusing on transparency and indigenous rights. The hackers extracted over 10 terabytes of sensitive data, including classified intelligence reports, counternarcotics operations, and documentation of human rights abuses. The breach affected six countries in total, including El Salvador, Colombia, and Peru, and showcased the growing sophistication of politically-motivated hacking collectives in the region.
Trinidad and Tobago Telecom Attack (2023)
Trinidad and Tobago faced a major ransomware hit on its state telecom company, which the Prime Minister labeled a national security threat. Sensitive data on citizens was stolen, demonstrating the vulnerability of critical communications infrastructure in the region. The attack disrupted internet and cellular services nationwide for over 72 hours, affecting banking operations, healthcare systems, and emergency response capabilities. Government officials confirmed that personal information of over 800,000 citizens was compromised, leading to identity theft concerns and highlighting the need for stronger data protection legislation across the Caribbean nations.
Initial Attack Vectors: Phishing & Social Engineering
41%
Attack Vector
Phishing identified as leading infection vector in incidents
600M
Daily Attacks
Microsoft reports filtering this many attacks daily
10x
Increase
Growth in password-based attacks year-over-year
The number one entry point for threat actors remains phishing and social engineering. Adversaries send carefully crafted emails (often spear-phishing specific targets) carrying malicious links or attachments to steal credentials or drop malware. For example, Russian and Iranian spies frequently use spear-phishing to trick officials into entering passwords on fake login pages. Business Email Compromise (BEC) scams are another form of social engineering causing massive financial losses.
These attacks have evolved significantly in sophistication. Modern phishing campaigns often leverage AI to create convincing messages, simulate writing styles of known contacts, and time attacks to coincide with organizational events. Attackers increasingly employ multi-channel approaches, following up emails with SMS or voice calls to build credibility in their deception attempts.
Notable recent incidents include the 2023 MOVEit Transfer exploitation where phishing emails directed victims to compromised file transfer tools, affecting thousands of organizations worldwide. The healthcare sector has been particularly vulnerable, with hospitals reporting increased targeted phishing campaigns designed to compromise patient data and disrupt critical services.
Effective countermeasures include implementing DMARC, SPF, and DKIM email authentication protocols, conducting regular phishing simulation exercises, and deploying AI-powered email security tools that can detect subtle indicators of social engineering. Organizations should also establish clear procedures for verifying unusual requests, especially those involving financial transactions or credential resets.
Initial Attack Vectors: Software Vulnerabilities
1
Identify Vulnerable Systems
Attackers scan for internet-facing systems with known security flaws using automated tools and vulnerability scanners. They target outdated software, misconfigured servers, and unpatched applications exposed to the internet.
2
Deploy Exploit Code
Leverage publicly available or custom exploit code to take advantage of the vulnerability. Attackers often use exploit kits and automated frameworks that can deploy multiple exploits simultaneously to increase success rates.
3
Establish Initial Access
Use the exploited vulnerability to gain a foothold in the target network. This could involve deploying web shells on compromised web servers, installing remote access trojans, or establishing C2 (command and control) channels back to attacker infrastructure.
4
Maintain Persistence
Install backdoors or create additional access methods to ensure continued access even if the original vulnerability is patched. This includes creating rogue user accounts, modifying scheduled tasks, or installing hidden services that survive system reboots.
Taking advantage of unpatched security flaws in internet-facing systems is the second most common entry tactic (seen in 26% of incidents per IBM X-Force). A notable example was the exploitation of Log4Shell (CVE-2021-44228) – a critical logging library bug – which was widely used by both state-backed hackers and cybercriminals in 2022 to infiltrate everything from government networks to hospital systems.
Other significant vulnerability exploitations include ProxyLogon and ProxyShell in Microsoft Exchange servers, which impacted thousands of organizations worldwide in 2021. The Follina vulnerability (CVE-2022-30190) in Microsoft Office was also widely exploited, allowing attackers to execute malicious code with minimal user interaction. Zero-day vulnerabilities—previously unknown security flaws—are particularly valuable to attackers because organizations have no defense prepared before exploitation begins.
Initial Attack Vectors: Stolen Credentials & Brute Force
Many incidents involve no malware or exploit at all – attackers simply log in using valid but compromised credentials (obtained via phishing or dark web leaks). In fact, 71% of attacks observed in 2022 were "malware-free," often relying on credential abuse and built-in system tools. Attackers also perform brute-force or password-spraying attacks against remote access services (RDP, SSH, VPN).
Credential theft remains the leading attack vector because of its simplicity and effectiveness. Organizations frequently struggle with password reuse, with the average employee reusing the same password across 7-9 different accounts. Once credentials are compromised, attackers can move laterally across networks while appearing as legitimate users, making detection challenging.
High-profile examples include the 2020 SolarWinds breach, where attackers used stolen credentials for initial access before deploying their supply chain attack, and the 2022 Uber compromise, where an attacker purchased stolen credentials on the dark web and bypassed multi-factor authentication through social engineering. According to Microsoft, there are over 921 password attacks every second worldwide – a 74% increase from the previous year.
Initial Attack Vectors: Supply Chain Compromise
SolarWinds Orion (2020-2021)
Russian intelligence inserted malicious code into software updates distributed to thousands of organizations, including U.S. government agencies. This sophisticated supply chain attack gave attackers persistent access to high-value targets for months before discovery.
The attack demonstrated how compromising a single trusted vendor could provide access to countless downstream organizations.
The attackers maintained access for up to 14 months in some networks, exfiltrating sensitive data and emails. This incident led to significant changes in software supply chain security practices across the industry and prompted executive orders regarding cybersecurity.
3CX Desktop App (2023)
North Korean Lazarus Group breached this popular VoIP software to attack its customers. By trojanizing legitimate software updates, the attackers were able to target specific organizations of interest while maintaining plausible deniability.
This attack specifically targeted cryptocurrency companies and financial institutions, aligning with North Korea's focus on generating revenue through cyber operations.
The malware used sophisticated command-and-control infrastructure and multi-stage payloads to avoid detection. Security researchers identified both Windows and macOS variants, indicating the attackers' technical expertise and determination to compromise specific high-value targets regardless of platform.
Kaseya VSA (2021)
The REvil ransomware group compromised this IT management software provider, affecting hundreds of downstream businesses. This criminal supply chain attack demonstrated that sophisticated supply chain techniques aren't limited to nation-states.
The attack impacted approximately 1,500 businesses worldwide, with ransom demands reaching $70 million for a universal decryptor.
The timing during the July 4th holiday weekend was strategically chosen to minimize immediate response capabilities. This attack highlighted a critical vulnerability of managed service providers (MSPs): their trusted access to multiple client networks creates an attractive target for attackers seeking maximum impact with minimal effort. Following the incident, the FBI recovered $6 million in ransom payments and indicted several REvil members.
Initial Attack Vectors: Other Methods
Additional attack vectors include watering hole attacks (compromising websites frequently visited by targets), physical intrusion methods like malicious USB drives, insider threats, and DDoS attacks that can serve as a distraction for other infiltration attempts.
Watering Hole Attacks
Threat actors identify and compromise websites regularly visited by their targets, such as industry forums, supplier portals, or professional associations. When targets visit these sites, they are served malicious JavaScript that exploits browser vulnerabilities or delivers drive-by downloads. Notable examples include attacks against defense contractors through compromised aviation websites and campaigns targeting Tibetan NGOs through community news sites.
Physical Intrusion Methods
Beyond malicious USB drives, adversaries employ tactics like device implants, network taps, and compromised peripherals. The "BadUSB" vulnerability demonstrated how firmware manipulation allows devices to masquerade as keyboards, injecting commands when connected. Some nation-state groups have specialized units for physical operations, as evidenced by sophisticated hardware implants documented in intelligence community leaks.
Insider Threats
Both unwitting and malicious insiders represent significant vectors. Privileged users may be recruited through social engineering, bribery, extortion, or ideological motivation. Studies indicate approximately 34% of breaches involve internal actors. Insider attacks are particularly dangerous as they originate from within perimeter defenses and often leverage legitimate credentials, making detection considerably more difficult.
DDoS as Smokescreen
Distributed Denial of Service attacks increasingly serve as diversionary tactics rather than primary attack vectors. Security teams focusing on mitigating service outages may miss subtle indicators of compromise elsewhere in their networks. The financial sector has particularly observed this pattern, with DDoS attacks against public-facing services coinciding with fraudulent wire transfer attempts or backend system compromises.
These diverse entry methods demonstrate the need for comprehensive security approaches that address both technical and human factors. Organizations must implement defense-in-depth strategies that combine technology controls, robust security awareness training, and operational security procedures to mitigate these varied attack vectors.
Malware and Exploits: RATs and Backdoors
Custom Nation-State Tools
Many state groups use custom or semi-custom backdoors – e.g., Russia's Turla group uses its Snake malware (until disrupted by the FBI in 2023), China's APTs have families like PlugX and ShadowPad, and Iran's groups use backdoors like Nanocore or newly developed implants.
These custom tools are often designed to evade specific detection mechanisms and security solutions. The development cycle typically involves specialized teams that analyze target environments and craft tailored capabilities for long-term persistence. Nation-state backdoors frequently implement sophisticated command-and-control infrastructures using techniques like domain fronting or encrypted communications over legitimate protocols.
Commodity Malware Adoption
State actors are increasingly using off-the-shelf malware. Microsoft noted that Russian operatives have integrated commodity RATs like Remcos and XWorm (commonly used by cybercriminals) into their toolkit.
This trend represents a significant shift in tactics, as it reduces development costs and speeds up deployment. Commercial tools often receive regular updates from their developers, providing state actors with maintenance and feature improvements without internal resource allocation. The adoption also creates plausible deniability, as the same tools are widely used in common criminal operations, complicating attribution efforts by security researchers.
Malware-as-a-Service
Tools like Cobalt Strike beacons or Metasploit are ubiquitous in intrusions across the board, providing attackers with ready-made capabilities that can be difficult to attribute to specific groups.
The commercialization of attack tools has democratized advanced techniques previously limited to sophisticated actors. Cobalt Strike, originally developed as a legitimate penetration testing framework, has become particularly prevalent due to its modular architecture and robust evasion capabilities. Nation-states may customize these frameworks with proprietary plugins or obfuscation techniques while leveraging the core functionality that has been battle-tested in thousands of engagements worldwide.
Attribution Challenges
The dual-use of tools makes attribution harder and leverages the extensive capabilities developed by hacker communities, allowing state actors to blend in with criminal activity.
Security researchers face significant challenges when attempting to distinguish between state-sponsored and criminal campaigns using similar toolsets. Technical indicators of compromise often overlap, forcing analysts to rely on contextual factors like targeting patterns, operational tempo, and strategic objectives. False flag operations further complicate this landscape, as sophisticated actors may deliberately mimic the techniques, tactics, and procedures (TTPs) of other known groups to mislead investigators and create geopolitical confusion.
Malware and Exploits: Ransomware and Wipers
Criminal Ransomware
Primarily associated with criminal gangs seeking financial gain, ransomware encrypts victim data and demands payment for decryption keys. Major groups like LockBit, BlackCat, and Clop have targeted organizations across all sectors.
Modern ransomware operations often employ a "double extortion" approach, stealing sensitive data before encryption and threatening to publish it if ransom isn't paid.
Criminal groups have evolved into "Ransomware-as-a-Service" (RaaS) models, where developers lease their malware to affiliates who conduct attacks, creating a sophisticated criminal ecosystem. Recent variants include polymorphic code that changes signatures to evade detection.
Notable victims include Colonial Pipeline (2021), which caused fuel shortages across the US Eastern seaboard, and healthcare systems during COVID-19, prompting some governments to consider ransomware attacks as terrorism.
Nation-State Wipers
Nation-states deploy wiper malware which is functionally similar to ransomware but intended to destroy rather than ransom. Russia's array of wipers in Ukraine (WhisperGate, HermeticWiper, CaddyWiper, AcidRain, etc.) masqueraded as ransomware or simply wiped data outright.
Iran has used wipers too (e.g., the ZeroCleare malware on Middle Eastern energy firms). These attacks are designed for maximum disruption rather than financial gain.
North Korea has deployed wipers like WannaCry (which included ransomware components but functioned primarily as a destructive tool) and the 2014 Sony Pictures attack using wiper malware that destroyed corporate systems.
Wiper attacks often coincide with kinetic military operations or geopolitical tensions, serving as cyber weapons in broader conflicts. The NotPetya wiper, initially deployed against Ukraine in 2017, spread globally causing over $10 billion in damages across multinational corporations.
Both ransomware and wipers have evolved to target critical infrastructure sectors including healthcare, energy, and government services, representing some of the most disruptive cyber threats facing organizations today. Their effects extend beyond data loss to operational shutdowns, supply chain disruptions, and in some cases, threats to human safety.
Malware and Exploits: Zero-Day Vulnerabilities
Discovery
Researchers or hackers find previously unknown software vulnerabilities that have not been patched or publicly disclosed. These flaws could exist in operating systems, applications, firmware, or hardware components. The discovery might happen through code analysis, fuzzing, reverse engineering, or accident.
Weaponization
Exploit code is developed to take advantage of the vulnerability. This involves creating reliable methods to trigger the flaw and gain system access, execute arbitrary code, or bypass security controls. Advanced threat actors often build sophisticated exploit chains combining multiple vulnerabilities for maximum impact.
3
Deployment
Exploits are used against high-value targets before patches exist. Nation-states and sophisticated criminal groups deploy zero-days in strategic operations, often through spear-phishing, watering hole attacks, or supply chain compromises. The target has no defense since the vulnerability is unknown to security vendors and software providers.
Discovery & Patching
Once detected, vendors release patches and exploits become "n-days". Security researchers may notice unusual activity, find artifacts in malware samples, or identify the vulnerability independently. After public disclosure, there's a race between patching systems and attackers exploiting unpatched targets before updates are applied.
Zero-day exploits target unknown (unpatched) vulnerabilities. Top nation-state teams continue to discover or purchase zero-days to use in operations. In 2022, a record number of zero-days were caught in the wild – many used by Chinese groups and Western intelligence agencies. The use of zero-days is generally reserved for high-value targets or initial footholds in hardened networks.
The economics of zero-days creates a controversial marketplace where vulnerabilities can sell for hundreds of thousands to millions of dollars. Organizations like the NSO Group, Zerodium, and nation-state intelligence agencies are major buyers. Defenders increasingly deploy behavioral detection, threat hunting, and zero-trust architectures to mitigate risk, as traditional signature-based defenses fail against previously unknown threats.
Malware and Exploits: "Living off the Land" Techniques
Native System Tools
Attackers use PowerShell scripts, WMI, PsExec, and other admin tools native to the OS to move laterally and exfiltrate data. These legitimate administrative utilities provide powerful capabilities for automating tasks, managing remote systems, and accessing system resources—all without raising suspicions because they appear as normal administrative activity in security logs.
Memory-Only Execution
Malicious code injected directly into memory without writing files to disk, evading traditional file-based detection. Sophisticated fileless malware can persist through registry modifications, scheduled tasks, or WMI event subscriptions. This technique bypasses signature-based detection systems and complicates forensic analysis since evidence vanishes when systems reboot.
Legitimate Credentials
Using stolen authentication tokens and credentials to access systems without triggering security alerts. Once attackers obtain valid credentials through phishing, credential dumping tools like Mimikatz, or exploitation of directory services, they can masquerade as legitimate users with full access privileges. Advanced persistent threats (APTs) often maintain access to compromised environments for months by using legitimate credential pairs.
Dual-Use Tools
Leveraging legitimate security and administration tools that are difficult to block in an enterprise environment. Programs like remote assistance software, network scanners, and penetration testing frameworks (e.g., Cobalt Strike, Metasploit) serve legitimate security purposes but are increasingly weaponized by attackers. Organizations cannot simply block these tools as they're often necessary for normal IT operations.
Attackers increasingly avoid using detectable malware files by abusing legitimate tools and in-memory techniques. This explains why so many attacks are "malware-free" on disk. The 2023 breach of a U.S. federal agency by a Chinese group (Storm-0558) involved stealing an authentication key and using legitimate tokens to access email accounts – no malware needed. These sophisticated techniques have dramatically increased detection challenges, with some threat actors maintaining persistent access for 200+ days before discovery. Security teams must now focus on behavioral anomalies, unusual process relationships, and suspicious command patterns rather than traditional malware signatures. The increasing adoption of living off the land techniques by less sophisticated actors suggests this trend will continue to dominate the threat landscape.
Malware and Exploits: DDoS Attacks
Distributed Denial of Service (DDoS) attacks overwhelm targets with massive traffic from multiple sources simultaneously. These attacks can be categorized into several types: Volumetric (45%) which flood networks with bandwidth-consuming traffic, Protocol (25%) which target server resources, Application Layer (20%) which focus on exploiting web application vulnerabilities, and Multi-Vector (10%) which combine multiple attack methods to evade defenses.
The scale of modern DDoS attacks has grown dramatically, with some reaching over 2 Tbps in volume. Attackers typically leverage botnets—networks of compromised devices including IoT devices, routers, and servers—to generate the required traffic volume. The rise of DDoS-for-hire services has made these attacks accessible to even non-technical adversaries.
In cyber warfare, DDoS has been a favorite of hacktivists and sometimes state actors as an auxiliary tactic. We've seen massive DDoS used in Ukraine (e.g., against banks and government sites in February 2022 prior to the Russian invasion) and by pro-Russia groups on Western targets (the KillNet attacks against government websites, airports, and financial institutions). The 2007 attacks against Estonia represented one of the first major nation-state level DDoS campaigns, effectively taking a country offline.
Defending against DDoS requires a multi-layered approach including traffic filtering, rate limiting, anycast network distribution, and specialized DDoS protection services. Organizations increasingly implement traffic anomaly detection systems that can distinguish legitimate traffic from attack traffic based on behavioral patterns.
Malware and Exploits: ICS/OT-Specific Malware
1
Target Reconnaissance
Mapping industrial control systems and understanding operational processes
2
IT/OT Bridge Compromise
Breaching the connection points between IT networks and operational technology
3
Control System Access
Gaining direct access to PLCs, RTUs, and other industrial controllers
4
Process Manipulation
Altering industrial processes or causing physical damage to equipment
A worrying subset of tools target industrial control systems (ICS) and operational technology (OT) used in utilities and manufacturing. These specialized malware variants are designed to bridge the air gap between traditional IT networks and industrial equipment, posing serious threats to critical infrastructure.
The most notorious example remains Stuxnet (2010), which damaged Iranian nuclear centrifuges by manipulating their rotation speeds while displaying normal readings to operators. This demonstrated that malware could cause physical destruction through digital means. Since then, we've seen variants like BlackEnergy (Ukraine power grid, 2015), Triton/TRISIS (Saudi petrochemical facilities, 2017), and CRASHOVERRIDE/Industroyer (Ukraine power grid, 2016).
In April 2022, researchers disclosed Industroyer2, an updated ICS malware deployed in Ukraine to attempt another grid shutdown, though it was foiled. The Volt Typhoon operation in U.S. power utilities was notable for focusing on stealthy data collection and persistence in SCADA systems rather than immediate effect. Pipedream/INCONTROLLER, discovered in 2022, is another worrying development - a modular ICS attack toolkit designed with components to target multiple vendor systems.
The consequences of successful ICS attacks can be severe: power outages affecting millions, damaged equipment worth millions of dollars, and in worst-case scenarios, risks to human life. Defending against these threats requires specialized knowledge of both IT security and industrial engineering - disciplines that have traditionally been separate.
Offensive Strategies: Espionage (Cyber Spying)
1
1
Target Selection
Identifying high-value targets based on intelligence requirements
2
2
Initial Access
Gaining entry through spear-phishing, exploits, or supply chain compromise
3
3
Lateral Movement
Expanding access across the target network to reach valuable data
4
4
Data Exfiltration
Stealing sensitive information while avoiding detection
5
5
Persistent Access
Maintaining long-term presence for continued intelligence gathering
By far the most common state-sponsored activity is espionage. Nations use cyber means to steal confidential data – diplomatic communications, military plans, trade secrets, research data, personal info on influential figures – anything that can provide a strategic or political edge. Nearly every government has been breached at some point for espionage; even the UN and NGOs are not off-limits.
Notable examples include China's APT1 campaign targeting intellectual property across 20 industries, Russia's SVR breaches of SolarWinds affecting thousands of organizations, and North Korea's targeting of cryptocurrency exchanges to evade sanctions. The tools and techniques have grown increasingly sophisticated, with attackers sometimes maintaining access for years before detection.
The economic impact of cyber espionage is staggering, with estimates suggesting losses of hundreds of billions annually across the global economy. Unlike traditional espionage, cyber methods allow for massive data collection at unprecedented scale and speed. Beyond immediate intelligence value, stolen data can be weaponized for future influence operations, blackmail, or to gain negotiating leverage in diplomatic settings.
Offensive Strategies: Sabotage and Disruption

1

2

3

4

1
Critical Infrastructure
Targeting power grids, water systems, telecommunications, and transportation networks to create widespread disruption and civil unrest. These attacks can leave entire cities or regions without essential services for days.
2
Government Services
Disrupting essential public services, government operations, and electoral systems to undermine trust in institutions. Recent attacks have targeted everything from tax systems to emergency services.
3
Communication Networks
Attacking satellites, internet infrastructure, and undersea cables to isolate regions or nations. These sophisticated operations can sever crucial international communications and disable military command systems.
4
Data Integrity
Manipulating or destroying critical information systems, including financial records, medical databases, and military intelligence. Unlike theft, these attacks aim to corrupt data permanently, creating lasting damage.
Some attacks aim to degrade or destroy the victim's capabilities. This can be in support of a military operation (as Russia did in Ukraine, knocking out comms, power, and government services to soften the battlefield), or as standalone coercion (like Iran's hit on Albania to punish it, or presumably Israel's hacks on Iran's fuel systems). One emerging worry is sabotage of satellites and undersea cables, as those are crucial for communication.
These disruptive attacks have evolved from simple denial-of-service operations to sophisticated multi-vector campaigns that can paralyze entire sectors. The 2017 NotPetya attack, attributed to Russia, began as targeted sabotage against Ukraine but spread globally, causing over $10 billion in damages to companies worldwide. As critical systems become increasingly interconnected, the potential impact of such attacks grows exponentially, making them attractive options for both nation-states and terrorist organizations seeking asymmetric advantages.
Offensive Strategies: Financial Gain
Ransomware Extortion
Criminal groups deploy encryption malware and demand payment for decryption keys, often threatening to publish stolen data if demands aren't met. Payments can reach tens of millions from a single target.
Recent attacks have grown in sophistication, with groups like Conti, REvil, and DarkSide targeting critical infrastructure and essential services. The Colonial Pipeline attack in 2021 resulted in fuel shortages across the eastern US after a $4.4 million ransom payment. Many groups now operate "Ransomware-as-a-Service" models, lowering the technical barrier to entry and expanding the threat landscape.
Cryptocurrency Theft
North Korean hackers have specialized in stealing from cryptocurrency platforms, including the $600 million Ronin Network theft in 2022. These operations help fund weapons programs and bypass international sanctions.
Beyond North Korea, other state and criminal actors target cryptocurrency exchanges and decentralized finance (DeFi) protocols through smart contract exploits, private key theft, and social engineering. The Lazarus Group has perfected spear-phishing campaigns targeting crypto exchange employees, while other attackers focus on vulnerable cross-chain bridges. Total crypto theft exceeded $3.8 billion in 2022 alone, representing a significant shift in cybercriminal focus.
Business Email Compromise
Attackers compromise or spoof executive email accounts to trick employees into making fraudulent transfers. Microsoft observed an all-time high in BEC activity in 2023, causing billions in losses globally.
These attacks have evolved from simple spoofing to sophisticated social engineering operations. Modern BEC campaigns often begin with careful reconnaissance of corporate communication patterns and financial processes. Attackers may lurk in compromised mailboxes for months, studying how the organization handles payments before striking at opportune moments, such as company acquisitions or end-of-quarter financial activities. The FBI reports BEC has caused over $43 billion in losses between 2016-2021, making it the costliest form of cybercrime.
Offensive Strategies: Influence and Information Operations
Hack-and-Leak Operations
Attackers steal sensitive emails or documents and then strategically leak them (often via fronts like WikiLeaks or Telegram channels) to embarrass or discredit targets. Russia has used hack-and-leak against Olympic agencies (2018) and during elections (the DNC email leaks in 2016).
In 2021 and 2022, Iranian and Russian actors leaked information from adversary governments (Iran leaked Israeli insurance records via a group called Moses Staff, while Russia or its supporters leaked documents from Eastern European governments).
The timing of these leaks is often carefully calculated for maximum impact. For example, the DNC emails were released just before the Democratic National Convention to cause maximum disruption. According to intelligence agencies, these operations frequently involve selective editing or manipulation of legitimate documents to create misleading narratives, making it difficult for targets to effectively respond.
Social Media Manipulation
Fake personas and bots on social media – sometimes enhanced by hacked accounts – are used to spread narratives and influence public opinion on key issues. These operations often target divisive social and political topics to amplify existing tensions.
China runs large networks of inauthentic social accounts to push pro-China views and conspiracy theories at scale. These operations can involve thousands of accounts working in coordination to make certain viewpoints appear more popular than they actually are.
Meta reported removing over 7,700 accounts, pages, and groups linked to coordinated influence operations in 2023 alone. These campaigns are increasingly sophisticated, using AI-generated profile photos and content to appear more authentic. Research from Stanford Internet Observatory found that modern influence operations often blur lines between commercial marketing, political campaigning, and foreign interference, making attribution and defense more complex.
Website Defacement
Hacktivists and state-sponsored groups compromise websites to display political messages or propaganda. This tactic is often used during geopolitical tensions to make public statements or demonstrate technical capabilities.
During conflicts, opposing hacktivist groups often engage in tit-for-tat website defacements, replacing content with political messages, national symbols, or claims of responsibility.
After Russia's invasion of Ukraine in 2022, the Ukrainian IT Army and allied hacktivists defaced hundreds of Russian government and corporate websites with anti-war messages. Simultaneously, pro-Russian groups targeted Ukrainian and Western sites. Though technically less sophisticated than other cyber operations, defacements can have significant psychological impact when targeting high-profile sites. The 2020 defacement of U.S. government websites with pro-Iran messages following the killing of General Soleimani demonstrated how quickly cyber operations can become integrated into broader geopolitical signaling.
Offensive Strategies: Geopolitical Signaling
Capability Demonstration
Limited attacks intended to showcase technical abilities without causing major damage. Nations often conduct these operations to demonstrate their cyber prowess to adversaries without triggering a full-scale response. For example, Russia's probes of U.S. critical infrastructure systems in 2018 served to highlight vulnerabilities while staying below the threshold of an act of war.
Warning Messages
Targeted intrusions that serve as warnings to adversaries about potential escalation. These operations typically target sensitive but non-critical systems to demonstrate access capabilities and serve as a deterrent. China's reported intrusions into Taiwan's government networks ahead of major political events exemplify this approach of signaling potential consequences.
Proportional Response
Cyber operations conducted in retaliation for other actions, calibrated to send a message while maintaining escalation control. The U.S. reportedly used this approach after election interference incidents, conducting precision operations against Russian intelligence infrastructure that demonstrated access without causing widespread disruption.
De-escalation Alternative
Using cyber means instead of kinetic force to respond to provocations, providing a less destructive outlet for international tensions. This approach allows nations to respond to adversaries without risking physical conflict. Israel has allegedly used targeted cyber operations against Iranian nuclear facilities as an alternative to conventional military strikes.
Sometimes cyberattacks are intended as signals of capability or warnings. Limited attacks, such as Iran's disruptive but not catastrophic assault on a U.S. city's water utility in 2021 (quickly detected and stopped), might be meant to say "we can reach you." North Korea's Sony Pictures hack in 2014 similarly sent a clear message about the regime's willingness to respond to perceived insults. During the Russia-Ukraine conflict, preliminary cyber operations served as precursors to conventional military actions, establishing a pattern of signaling intent through digital means. This use of cyber tools in place of or to complement traditional force is an ongoing strategic calculation, allowing nations to communicate intentions and establish deterrence while maintaining plausible deniability and avoiding the political costs of conventional military action.
Offensive Strategies: Ideology and Political Protest
Hacktivists attack to make a statement or push a cause. For example, Anonymous targeting Russian sites was ideologically driven to oppose the war. Pro-Islamic hacker groups defacing French websites in 2023 claimed to protest "blasphemy" or political stances. These motivations are as varied as global politics; some are state-incited (patriotic hacking), others are grassroots. Their impact can range from nuisance-level defacements to significant data exposures.
The spectrum of hacktivist operations continues to evolve. Environmental activists have targeted fossil fuel companies, exposing internal communications about climate policy. Pro-democracy hackers have disrupted authoritarian regimes' propaganda channels. In some cases, like the 2022 attacks against Iranian government websites during protests, hacktivists aim to directly support on-the-ground movements.
Hacktivist tools and tactics vary widely in sophistication. While some groups employ basic website defacements or DDoS attacks for visibility, others conduct complex data exfiltration operations or develop specialized malware. Groups like Distributed Denial of Secrets function as transparency organizations, focusing on publishing leaked materials rather than conducting attacks themselves. The line between hacktivism and state-sponsored operations can blur, with governments occasionally leveraging ideologically-motivated hackers as proxies for plausible deniability.
Recent Trends in Cyber Tactics
Accelerated Attack Timelines
Attackers are moving faster inside networks once they break in. CrowdStrike reported an average "breakout time" (time from initial compromise to moving laterally) of just 84 minutes for eCrime actors – meaning defenders have less than 2 hours to detect and contain an intrusion before it potentially spreads. This represents a 67% reduction from previous years, demonstrating significantly improved operational efficiency among threat actors.
This acceleration is enabled by automated tools and pre-staged attack infrastructure. Some advanced threat groups now achieve full domain compromise in under 30 minutes using pre-packaged exploit chains and reconnaissance scripts. Organizations without 24/7 security monitoring capabilities are particularly vulnerable to these rapid attacks, which often occur during nights and weekends when security teams are minimally staffed.
Cloud Infrastructure Targeting
There's been a surge in attacks targeting cloud infrastructure and supply chains. One report noted a 95% increase in cloud exploitation year-over-year. As organizations migrate to cloud services, threat actors follow, exploiting misconfigurations or flaws in cloud platforms. The most common vectors include improperly secured storage buckets, overprivileged IAM roles, and vulnerable APIs.
Recent incidents have demonstrated the severe impact of these attacks. In one case, attackers exploited a cloud misconfiguration to access over 100 million customer records from a major financial institution. The MITRE ATT&CK framework has expanded to include specific cloud-based techniques, with researchers documenting over 40 distinct tactics specifically for compromising cloud environments. Multi-cloud environments present additional complexity, as security controls often don't translate seamlessly between different providers.
Access Broker Specialization
Access brokerage and specialization in the cybercrime ecosystem have grown. Access brokers sell initial access to corporate networks on dark web markets, which ransomware gangs then buy – CrowdStrike saw a 112% increase in such advertisements. This specialization represents a maturing of the cybercrime economy, with distinct roles emerging in the attack chain.
The average price for network access ranges from $1,000 to $10,000 depending on the organization's size, industry, and potential value. Healthcare and financial services command premium prices. Some access brokers offer "satisfaction guarantees" or support services, demonstrating the business-like nature of modern cybercrime. Law enforcement operations have identified several major brokers operating from Eastern Europe and Russia, though attribution remains challenging as these actors employ sophisticated operational security measures including cryptocurrency transactions, encrypted communications, and multiple layers of proxies.
Evasion Innovation
Attackers continue to innovate in evasion, using encryption (malware payloads encrypted or delivered via TLS channels), abusing legitimate software (e.g., injecting into trusted processes), and using "island hopping" (once they take a smaller target, they use it to pivot to larger partners). These techniques help bypass traditional security controls like signature-based detection.
Fileless malware attacks increased by 146% according to recent industry reports, with adversaries leveraging legitimate Windows tools like PowerShell and WMI to execute attacks entirely in memory. Living-off-the-land techniques, where attackers use built-in system tools rather than custom malware, have become standard practice even among nation-state actors. The evasion arms race has accelerated with AI integration - some malware can now dynamically alter its behavior when it detects analysis environments or security tools, making detection increasingly difficult. Organizations are responding with behavior-based detection systems that look for suspicious activity patterns rather than specific signatures.
National Cybersecurity Strategies
United States (2023)
Released a sweeping National Cybersecurity Strategy that calls for "rebalancing the responsibility to defend cyberspace" by shifting more burden to large technology providers and away from individual users and small businesses.
This strategy envisions software makers being held liable for insecure code and mandates more secure development practices. It also emphasizes disruption of threat actors through offensive operations ("defend forward") and improved federal network security.
The plan allocates $11.2 billion for civilian cybersecurity programs and emphasizes workforce development with initiatives to fill over 750,000 open cybersecurity positions. It also creates new international partnerships focused on capacity building and harmonizing regulations across borders.
European Union
The EU's NIS2 Directive (enacted 2023) expands requirements for cybersecurity and incident reporting across more sectors, aiming to raise the baseline resilience of critical services in all member states.
This comprehensive approach creates a more unified European response to cyber threats and establishes minimum security standards that organizations must meet to operate within the EU.
Additionally, the EU's Cyber Resilience Act now mandates security-by-design principles for connected products, requiring manufacturers to provide security updates throughout a product's lifecycle and display a "CE" cybersecurity label. The Digital Operational Resilience Act (DORA) specifically targets the financial sector, requiring rigorous testing and incident reporting.
The EU has also established the European Cyber Crisis Liaison Organisation Network (EU-CyCLONe) to coordinate responses during large-scale incidents affecting multiple member states.
Asia-Pacific Nations
Japan in 2022 and South Korea in 2023 each elevated cybersecurity in their national defense plans, given increasing regional threats. Australia, after suffering major breaches, announced an ambitious goal to become the most cyber secure nation by 2030.
These strategies commonly highlight public-private partnership, because most critical infrastructure is owned by the private sector, and stress the importance of basics like risk management, supply chain security, and R&D investment in cyber capabilities.
Singapore's Cybersecurity Strategy 2.0 focuses on building a "cyber-smart population" with nationwide digital defense education programs and creating a vibrant cybersecurity ecosystem through talent development and innovation hubs.
China has taken a different approach with its 2016 Cybersecurity Law and subsequent Data Security Law, emphasizing data localization, state access to systems, and "cyber sovereignty" – asserting governmental control over internet infrastructure within its borders.
Cyber Command and Military Integration

1

2

3

4

5

1
Strategic Direction
National security policy guiding cyber operations
2
Cyber Commands
Dedicated military units for defensive and offensive operations
3
Defensive Operations
Protecting military networks and critical infrastructure
4
Offensive Capabilities
Developing tools and conducting authorized cyber operations
5
International Cooperation
Joint exercises and information sharing with allies
Many nations have integrated cyber operations into their military structures. NATO recognized cyberspace as a domain of operations (like land, sea, air, space) in 2016 and affirmed that a serious cyberattack could trigger Article 5 collective defense obligations. Countries such as the US, UK, France, Russia, China, Israel, Iran, and North Korea all have dedicated cyber warfare units.
The United States Cyber Command (USCYBERCOM) was established in 2009 and elevated to a unified combatant command in 2018, reflecting the growing importance of cyber operations. Similarly, China's Strategic Support Force, created in 2015, consolidates cyber, electronic, and space warfare capabilities under a single military branch. Russia's cyber capabilities are distributed across military intelligence (GRU), the FSB, and specialized military units.
These military cyber units typically develop both defensive capabilities to protect critical national infrastructure and military networks, as well as offensive tools that can be deployed for espionage, sabotage, or battlefield support operations. The integration of cyber operations with traditional military doctrine represents one of the most significant evolutions in warfare since the development of air power.
Hunt Forward Operations
Deployment Request
Allied nation requests assistance with suspected network intrusions or to improve defensive posture. This cooperative approach allows for sharing of expertise and resources between partner nations. Requests typically follow intelligence indicators of compromise or suspicious network activity that exceeds local defensive capabilities. The formal request process ensures sovereignty is respected while establishing clear operational parameters and legal frameworks.
Threat Hunting
U.S. Cyber Command teams deploy to the allied country and work alongside local experts to search for adversary presence in networks. These teams bring specialized tools and techniques developed through extensive experience with advanced threats. Using a combination of signature-based detection and behavioral analysis, they identify sophisticated threats that might evade standard security measures. The collaborative environment creates bilateral knowledge transfer, building partner capacity while giving U.S. teams exposure to novel threat tactics.
Adversary Eviction
Once threats are identified, the joint team works to remove the intruders and secure the network against similar future attacks. This includes implementing improved security controls and monitoring capabilities. Teams develop customized remediation plans that account for the specific adversary tactics observed and the network architecture. The eviction process must be carefully orchestrated to prevent adversaries from realizing they've been detected, which could prompt them to activate destructive payloads or establish alternate access methods before being fully removed.
Intelligence Sharing
Threat data is collected and shared with other allies to improve global cyber defenses against common adversaries. This creates a multiplier effect where lessons learned in one operation benefit the broader international community. Technical indicators, malware samples, and adversary tactics are sanitized and distributed through secure channels to trusted partners. This intelligence sharing helps create a more resilient international security posture while denying adversaries the ability to reuse tools and techniques across multiple targets.
The U.S. Cyber Command has been actively conducting "hunt forward" missions – deploying cyber teams to allied countries (like Ukraine, Lithuania, Montenegro, Estonia, and North Macedonia) to help find and evict adversary malware in their networks preemptively. These missions both aid allies and give the U.S. insight into adversary tools. Since 2018, Cyber Command has conducted over 35 hunt forward operations in 18 countries, demonstrating the growing importance of this proactive defensive strategy. The operations have proven particularly valuable in protecting election infrastructure and critical sectors like energy and transportation from state-sponsored threats. By engaging threats in allied networks before they can target U.S. systems, these operations represent a fundamental shift toward persistently engaging adversaries outside U.S. networks.
International Cooperation and Alliances
1
Tallinn Mechanism
Formalized by nine NATO members in 2023 to coordinate civilian cyber assistance to Ukraine. The mechanism establishes protocols for rapid deployment of expertise, tools, and resources to counter active cyber threats. It represents a new model for international cyber cooperation during active conflicts.
2
EU Cyber Rapid Response Teams
Multinational teams that can deploy across the EU during major incidents. These teams consist of experts from multiple member states who bring specialized skills in incident response, forensics, and threat mitigation. They operate under a unified command structure to ensure coordinated action.
3
Counter-Ransomware Initiative
International effort involving over 30 countries to combat ransomware. This initiative focuses on improving resilience, addressing cryptocurrency misuse in ransomware payments, strengthening law enforcement collaboration, and pursuing diplomatic engagement with countries hosting ransomware actors.
4
Public-Private Partnerships
Collaboration between governments and tech companies on threat intelligence. These partnerships enable real-time sharing of indicators of compromise, vulnerability information, and mitigation strategies. They also facilitate coordinated disclosure of major security incidents and joint development of security standards.
Cyber threats ignore borders, so countries are increasingly working together. The Tallinn Mechanism allows nations to quickly provide expertise and support to allies under cyberattack, drawing lessons from the collective defense mounted during the Ukraine war. NATO as an alliance has bolstered its cyber defense posture: it runs annual exercises like Locked Shields and Cyber Coalition, has a Malware Information Sharing Platform accessible to all member states, and established a Cyberspace Operations Centre in Belgium that coordinates NATO's cyber capabilities. Additionally, the Five Eyes intelligence alliance (US, UK, Canada, Australia, New Zealand) maintains extensive cyber threat intelligence sharing, while regional bodies like ASEAN have developed their own cybersecurity action plans and incident response mechanisms.
Cyber Norms and International Law
1
UN Group of Governmental Experts
Affirmed a set of 11 voluntary norms for responsible state behavior in cyberspace, establishing expectations for transparency, cooperation, and restraint in cyber operations
2
Critical Infrastructure Protection
Agreement not to attack critical infrastructure like power grids, hospitals, or financial systems in peacetime, recognizing the severe humanitarian consequences of such attacks
3
CERT Protection
Commitment not to target each other's Computer Emergency Response Teams, which are essential for maintaining cybersecurity and responding to incidents across national boundaries
4
International Law Application
Consensus that existing international law applies to cyber operations, including principles of sovereignty, human rights, and the laws of armed conflict that govern state actions
5
UN Cybercrime Treaty
First-ever global cybercrime treaty approved by the UN Security Council in 2024, aiming to standardize criminal laws and facilitate international cooperation in cybercrime investigations
On the diplomatic front, there is a push to establish "rules of the road" for state behavior in cyberspace. These norms set a baseline, but enforcement is challenging since they are non-binding. The Budapest Convention on Cybercrime provided an early framework, but many countries remained outside its scope. The Tallinn Manual has offered legal experts' interpretations on how international law applies to cyber operations, though it's not an official document. Despite these challenges, broad consensus exists that existing international law (such as the UN Charter and International Humanitarian Law) applies to cyber operations, creating a foundation for accountability and stability in cyberspace.
Attribution and Accountability
Identifying the perpetrators of cyberattacks with high confidence is a complex technical and political process. Technically, investigators analyze malware code, infrastructure (servers, IPs used), tactics, and sometimes mistakes by attackers to attribute incidents to specific groups or state sponsors. Attribution can be muddied by adversaries' countermeasures like proxy servers, stolen credentials, and false flag operations designed to mislead investigators.
Technical attribution typically relies on the "Diamond Model" of intrusion analysis, which examines adversary infrastructure, capabilities, and victim targeting patterns to establish a threat actor's digital fingerprint. However, as shown in the chart, sophisticated actors employ multiple obfuscation techniques that significantly increase attribution difficulty. False flag operations represent the greatest challenge at 85% difficulty, as they deliberately plant misleading evidence pointing to innocent third parties.
Even when technical attribution succeeds, establishing accountability presents additional challenges. Nations often deny involvement despite compelling evidence, claiming that attacks originated from "patriotic hackers" or criminal groups outside government control. The lack of binding international enforcement mechanisms further complicates holding responsible parties accountable, creating a situation where attribution may be technically possible but politically inconsequential. This accountability gap has led to proposals for a more robust international legal framework specifically addressing state responsibility in cyberspace.
Public Attribution Statements
1
July 2021
US, EU, UK jointly blamed China's Ministry of State Security for the Microsoft Exchange hacks that compromised over 30,000 organizations globally
  • First coordinated attribution against China by Western allies
  • Included unusual public statements from NATO and Japan
2
May 2022
The EU, UK, and US formally accused Russia of the Viasat satellite communications system sabotage
  • Attack occurred one hour before Ukraine invasion
  • Disrupted Ukrainian military communications and affected civilian infrastructure across Europe
3
September 2022
Albania severed diplomatic ties with Iran following attribution of cyberattacks against government services
  • First case of diplomatic relations being cut due to cyberattacks
  • US imposed additional sanctions on Iran's intelligence ministry in response
4
July 2024
Unprecedented joint advisory by US, Canada, UK, Australia, New Zealand, Japan, and South Korea called out China for state-sponsored cyber intrusions
  • Named specific APT groups with direct ties to Chinese intelligence
  • Detailed tactics used to compromise critical infrastructure and telecommunications
In the past two years we've seen more frequent public attributions of cyber attacks to specific nation-states. These coordinated statements by multiple countries carry diplomatic weight and serve to establish norms by publicly identifying violations. The growing trend of multilateral attribution statements demonstrates increasing international consensus on identifying and calling out malicious cyber behavior.
Attribution statements are often accompanied by technical evidence, sanctions, indictments, or other diplomatic measures. They represent a strategic tool in cyberdiplomacy, allowing nations to signal red lines and build coalitions against specific threat actors. However, they also raise questions about escalation risks and the effectiveness of "naming and shaming" as a deterrent when not backed by concrete consequences.
Critical Infrastructure Resilience
Energy Sector
Power grid protection and resilience measures
  • Network segmentation and monitoring
  • Air-gapped critical systems
  • Backup control capabilities
  • Supply chain security protocols
  • Regular penetration testing
Water Systems
Securing water treatment and distribution
  • Chemical monitoring safeguards
  • Manual override capabilities
  • Anomaly detection systems
  • Physical access controls
  • Redundant communication channels
Healthcare
Protecting patient care systems
  • Offline backup procedures
  • Segmented medical devices
  • Continuity of care planning
  • Staff security awareness training
  • Secure telemedicine platforms
Financial Services
Ensuring economic stability
  • Distributed transaction systems
  • Regular recovery testing
  • Fraud detection mechanisms
  • Cross-institution communication protocols
  • Cryptocurrency monitoring capabilities
A key defensive strategy is hardening vital systems to withstand attacks. Governments have identified "critical sectors" such as energy, water, healthcare, transportation, finance, etc., and are pushing those industries to adopt higher security standards. Many countries now require critical infrastructure operators to report significant cyber incidents to authorities within a short timeframe.
These resilience efforts recognize that perfect security is impossible, so organizations must be able to continue essential functions even while under attack. Industry-specific regulations like the EU's NIS2 Directive and the US's NERC CIP standards establish minimum security baselines. The trend is moving toward more prescriptive requirements rather than just encouraging voluntary best practices, especially as cyber threats increasingly target these foundational systems.
Cross-sector dependencies also present a challenge – for example, healthcare facilities rely on energy grids, which depend on transportation systems for fuel delivery. Modern resilience planning must account for these cascading effects and develop coordinated response strategies across sector boundaries.
Public Cyber Awareness and Workforce
Security Awareness Training
Given that human error (like clicking phishing links) is still a major enabler of attacks, governments and companies have increased efforts in security awareness training. Campaigns to educate the public on identifying phishing and using strong authentication are ongoing.
These programs focus on practical skills like recognizing suspicious emails, using password managers, enabling multi-factor authentication, and reporting security incidents promptly.
Organizations are increasingly adopting simulation-based training, where employees receive fake phishing emails to test their vigilance. Those who fall for these simulations receive immediate education. Studies show this approach can reduce successful phishing attacks by up to 75% when combined with regular refresher courses.
Some countries have introduced cyber hygiene education in schools, teaching children about online safety from an early age. Finland and Estonia have pioneered these programs, integrating digital literacy and security awareness into standard curricula.
Workforce Development
Many nations face a cybersecurity skills shortage. Initiatives like scholarships, cyber ranges, and competitions (e.g., Cyber Patriot, European Cybersecurity Challenge) are being used to cultivate talent that can staff Security Operations Centers and cyber units.
Universities are expanding cybersecurity degree programs, while industry certifications provide paths for professionals to specialize in areas like penetration testing, incident response, and security architecture.
The global cybersecurity workforce gap exceeds 3.5 million positions, with critical shortages in cloud security, application security, and security analysis. To address this, governments like the UK, US, and Israel have established specialized training academies that fast-track candidates into cybersecurity roles.
Industry-academic partnerships are creating innovative pathways to security careers. Companies like Cisco, IBM, and Microsoft offer apprenticeship programs that combine formal education with on-the-job training, helping to diversify the talent pipeline and bring in professionals from non-traditional backgrounds.
Cyber Civil Defense
The idea of a "cyber civil defense" has emerged – encouraging tech-savvy citizens to contribute to national cybersecurity. Estonia has a volunteer Cyber Defence League integrated into its defense structure, and Ukraine's IT Army was a crowdsourced effort to fight back in cyberspace.
These volunteer organizations can provide surge capacity during major incidents and help bridge the gap between government capabilities and private sector expertise.
Following major cyber incidents, several countries have formalized civilian cyber response structures. The Netherlands' National Cyber Security Centre coordinates with a network of technical volunteers who can be activated during national emergencies, while Japan's J-CRAT (Cyber Rescue and Advice Team) brings together retired cybersecurity professionals to assist organizations under attack.
Beyond direct defense, civic hacking groups like Random Hacks of Kindness coordinate "hackathons" where volunteers build tools to address cybersecurity challenges affecting vulnerable populations. These initiatives have created privacy-enhancing technologies for journalists, human rights defenders, and communities targeted by surveillance, extending the concept of cyber civil defense to protecting democratic values online.
Emerging Defensive Technologies
Artificial Intelligence
Leveraging machine learning to detect anomalies and intrusions faster. Large tech companies report using AI to filter out millions of phishing attempts and to spot patterns in vast telemetry that might indicate an attack.
Advanced AI systems can now predict potential vulnerabilities before they're exploited by analyzing trends across global threat landscapes. These systems continuously learn from each attack, improving defense mechanisms in real-time and reducing false positives that often plague traditional security tools.
Quantum-Resistant Encryption
Developing cryptographic methods that can withstand future quantum computing attacks. NATO and other organizations are working to implement these technologies to protect sensitive communications.
The National Institute of Standards and Technology (NIST) has selected candidate algorithms for standardization, and organizations are beginning migration planning. This pre-emptive approach aims to ensure data encrypted today won't be vulnerable to decryption when powerful quantum computers become available in the coming decade.
Threat Hunting
Proactively searching networks for signs of adversary presence rather than waiting for alerts. This approach helps identify sophisticated attackers who might otherwise remain hidden for months.
Modern threat hunting combines human expertise with automated tools to establish baselines of normal behavior and investigate deviations. Elite threat hunting teams regularly simulate advanced persistent threats to test defenses and develop new detection methodologies, shifting from reactive to anticipatory security postures.
Zero Trust Architecture
Assuming breach and designing networks so that compromise of one node doesn't grant wide access. This security model requires continuous verification of every user and device.
Implementation involves micro-segmentation, least privilege access, and continuous monitoring and validation. Organizations adopting Zero Trust report significant reductions in breach impact, with many government agencies now mandating this approach for critical systems. The principle "never trust, always verify" extends beyond network access to applications, data, and infrastructure.
Challenges in Cyber Defense
Private Sector Cooperation
Since much of cyberspace is owned by tech firms and telecom providers, their cooperation and secure practices are vital. The 2023 U.S. strategy's call for software liability reflects frustration that too many vulnerabilities are introduced by vendors and left unpatched by users. Recent incidents like the SolarWinds breach highlight the cascading effects when private sector security fails. Companies often prioritize time-to-market over security, creating an ecosystem where vulnerabilities proliferate faster than they can be addressed. Additionally, information sharing between companies remains insufficient, with proprietary concerns and competitive dynamics impeding collective defense capabilities.
Resource Disparities
Not all countries have the resources to implement strong cyber defenses, creating weak links that attackers can exploit (and then pivot to others). This global disparity in cybersecurity capabilities creates opportunities for attackers to target the most vulnerable points. Developing nations often lack both the financial resources and technical expertise needed to build robust cyber protection frameworks. International capacity-building efforts exist but remain underfunded and inconsistently implemented. Meanwhile, critical infrastructure in less-resourced regions becomes an attractive target for both criminal groups and nation-state actors, who can use these compromised systems as launching points for more sophisticated attacks against better-defended targets.
Political Divisions
While cooperation is better than a decade ago, political divides (East-West distrust, differing views on internet regulation) hamper a truly unified response system. These geopolitical tensions often prevent effective information sharing and coordinated responses to global threats. The Internet Governance Forum and UN cyber norms discussions have highlighted fundamental differences in how nations view digital sovereignty and content regulation. China and Russia advocate for greater state control over internet infrastructure and content, while Western democracies push for a more open, multi-stakeholder model. These competing visions make it nearly impossible to establish universal standards for acceptable behavior in cyberspace, creating gray zones that sophisticated threat actors eagerly exploit.
Attribution Difficulties
The technical challenges of definitively identifying attackers, combined with deliberate obfuscation techniques, make it difficult to hold malicious actors accountable. This undermines deterrence and complicates diplomatic and legal responses to cyber attacks. Attackers routinely use proxies, compromised infrastructure in neutral countries, and "false flag" techniques to obscure their true identity. Even when technical evidence points to a particular group or nation, establishing legal standards of proof remains problematic. The ability to maintain plausible deniability encourages more aggressive cyber operations, as actors calculate that the consequences of being caught are minimal compared to potential intelligence or strategic gains. This creates a persistent accountability gap that fundamentally weakens the international security framework.
Law Enforcement and Legal Actions
Governments and international organizations employ a variety of approaches to combat cybercrime and state-sponsored attacks through legal and operational measures:
Investigation and Attribution
Law enforcement agencies work to identify perpetrators through technical forensics, intelligence sharing, and international cooperation. This process often involves collaboration between multiple countries and specialized cyber units.
Organizations like INTERPOL's Cyber Fusion Centre and the European Cybercrime Centre (EC3) coordinate cross-border investigations. Digital evidence collection includes analyzing malware signatures, network traffic patterns, and command-and-control infrastructure to establish links to known threat actors.
Indictments and Sanctions
The U.S. DOJ has unsealed indictments against state hackers from Russia, China, Iran, and North Korea, signaling that they are known. Western nations have levied sanctions on entities like Russia's GRU, FSB, Chinese tech companies aiding hacking, and cryptocurrency mixers used by hackers.
These legal actions serve multiple purposes: they restrict financial operations, limit travel opportunities for individuals, and publicly attribute cyber operations to specific state actors. The 2018 indictment of 12 Russian intelligence officers for election interference and the 2020 sanctions against APT40, a Chinese state-sponsored group, demonstrate this approach.
Infrastructure Takedowns
Coordinated operations to dismantle criminal infrastructure, such as the January 2023 FBI and Europol operation that dismantled the Hive ransomware servers. These actions directly disrupt the technical capabilities of threat actors.
Operation TOVAR in 2014 targeted the GameOver Zeus botnet, while 2021's Operation Trojan Shield saw law enforcement agencies create and operate an encrypted communications platform used by criminals worldwide. These operations require court orders, international coordination, and careful timing to maximize their effectiveness and prevent threat actors from simply relocating their infrastructure.
Arrests and Prosecution
When possible, cybercriminals are arrested and extradited to face justice. Examples include a Ukrainian arrested in Poland for the JJCU ransomware and a Russian hacker extradited to the US from Georgia in 2022.
High-profile cases include the 2016 arrest of Roman Seleznev, who received a 27-year sentence for stealing millions of credit card numbers, and the 2021 takedown of REvil ransomware affiliates across multiple countries. These prosecutions face challenges including diplomatic tensions, limited extradition treaties with certain nations, and the resource-intensive nature of building complex technical cases that meet legal standards of evidence.
Despite these enforcement mechanisms, challenges remain due to jurisdictional limitations, the anonymity of cyberspace, and the protection some state-sponsored hackers receive from their governments. International law continues to evolve to address these novel challenges in the digital domain.
Public-Private Partnerships
Joint Cyber Defense Collaborative
Launched by U.S. CISA in August 2021, this initiative brings big cloud and software firms together with government to plan against threats. It proved useful during the Log4Shell crisis, enabling coordinated response across sectors.
This model recognizes that effective cyber defense requires the combined expertise and visibility of both government and private sector entities, each bringing unique capabilities to the table.
JCDC members include tech giants like Microsoft, Google, and Amazon alongside telecommunications leaders and defense contractors. Their collaborative planning has strengthened critical infrastructure protection and improved incident response capabilities nationwide. The JCDC represents a new model where prevention and proactive defense are prioritized over traditional reactive approaches.
Ukraine Defense Assistance
In 2022–23, big tech firms often announced they were actively helping Ukraine's cyber defense – Microsoft and Google provided threat intelligence and services worth hundreds of millions.
This unprecedented level of private sector involvement in an international conflict demonstrated how tech companies have become essential partners in national security operations.
Microsoft's Digital Security Unit worked directly with Ukrainian officials to counter Russian attacks, while Amazon Web Services provided cloud infrastructure to safeguard critical Ukrainian government data. Telecom companies established secure communications channels, and cybersecurity firms offered specialized tools to detect and mitigate the sophisticated attacks targeting Ukrainian infrastructure. This cooperation created a digital shield that significantly reduced the effectiveness of Russia's cyber operations.
Threat Intelligence Sharing
Companies like Microsoft, Mandiant, or CrowdStrike will often first flag state-linked activity, which governments later confirm. This partnership leverages the global visibility of private security firms.
The model of an integrated public-private shield is increasingly seen as the way forward, given that private sector often detects attacks first due to their position managing critical infrastructure and services.
These relationships have been formalized through various mechanisms including the Cyber Safety Review Board, Information Sharing and Analysis Centers (ISACs), and automated indicator sharing platforms. The 2021 Executive Order on Improving the Nation's Cybersecurity further strengthened these partnerships by removing barriers to threat information sharing. Success stories include the joint takedown of botnets like Emotet and TrickBot, where private expertise combined with government legal authorities achieved outcomes impossible for either sector alone.
Case Study: Viasat KA-SAT Hack (February 2022)
1
February 24, 2022
Hours before Russia's physical invasion of Ukraine begins, Russian military intelligence targets critical communications infrastructure to disrupt Ukrainian military and government coordination during the initial invasion phase.
2
Initial Attack
Russian hackers deploy AcidRain wiper malware targeting KA-SAT modems. The sophisticated attack exploited a management interface vulnerability in the satellite network's ground systems, allowing attackers to push malicious firmware updates to terminals.
3
Attack Mechanism
The attackers compromised the KA-SAT management segment in a supply-chain style attack, using legitimate network management commands to distribute destructive code that permanently bricked the modems by overwriting key flash memory components.
4
Widespread Impact
~30,000 satellite modems disabled across Ukraine and parts of Europe. The attack affected Ukrainian military communications, government agencies, and emergency services at a critical moment. In Germany, nearly 5,800 wind turbines lost remote monitoring capabilities due to disabled modems.
5
Repair Efforts
Viasat began shipping replacement modems to affected customers as software repairs were impossible. The company distributed over 30,000 new modems in the weeks following the attack, demonstrating the permanent hardware damage caused.
6
May 2022
EU, UK, and US formally attribute the attack to Russia's GRU (Main Intelligence Directorate). Intelligence agencies identified Unit 74455, also known as "Sandworm," as the specific GRU unit responsible for developing and deploying the AcidRain malware.
7
Strategic Significance
The attack represents one of the first examples of a coordinated cyberattack timed precisely with conventional military operations, demonstrating Russia's integrated approach to hybrid warfare and setting a concerning precedent for future conflicts.
One of the most damaging cyber attacks of the Russia-Ukraine war was the attack on Viasat's KA-SAT satellite network on February 24, 2022: Russian hackers knocked out satellite modems across Ukraine (to disrupt military communications) and incidentally cut off internet for thousands of users in Ukraine and even other European countries. The attack was described as "perhaps the biggest cyber event that we have seen in terms of impact" by a Western official.
The Viasat incident highlighted several critical vulnerabilities in satellite communications systems that are widely used by both military and civilian sectors. Security researchers noted that the attack demonstrated sophisticated understanding of the target system architecture and deliberate timing to maximize operational impact during the invasion's first hours. The collateral damage across European countries also raised important questions about the international norms and boundaries in cyberspace during armed conflicts.
Case Study: Costa Rica Ransomware Crisis (April-May 2022)
1
Initial Attack
The Conti ransomware gang targeted Costa Rica's Ministry of Finance in April 2022, encrypting critical systems and demanding a $10 million ransom payment. The attack quickly spread to other government agencies. Hackers initially gained access through a phishing email that compromised an employee's credentials, demonstrating how human vulnerabilities often serve as entry points for sophisticated cyber operations. Within hours, government officials discovered that tax collection systems were inaccessible and data was encrypted.
2
National Emergency
As the attack paralyzed tax collection, customs operations, and healthcare services, Costa Rica's president declared a national state of emergency on May 8, 2022 - the first country to do so because of a ransomware attack. This unprecedented decision underscored the severity of the crisis and highlighted how cybersecurity threats have evolved into national security issues. The emergency declaration allowed the government to redirect resources and implement extraordinary measures to address the crisis while international cybersecurity experts were called in to assist.
3
Widespread Disruption
Nearly two dozen Costa Rican government agencies were crippled over weeks. The attack disrupted international trade, tax payments, and social services, demonstrating how criminal cyberattacks can trigger nationwide crises. Import/export operations were severely delayed, with goods piling up at borders and ports. Government employees reverted to using paper systems for critical operations, causing massive backlogs. Economic experts estimated losses exceeding $30 million in trade and tax revenue, far surpassing the initial ransom demand.
4
Long-Term Consequences
The crisis exposed fundamental vulnerabilities in government digital infrastructure and prompted a comprehensive cybersecurity overhaul. Costa Rica refused to pay the ransom, instead investing in rebuilding systems with improved security. Recovery took months, with some systems remaining partially compromised into late 2022. The attack sparked international cooperation initiatives, with the United States and other allies providing technical assistance and training. This case became a watershed moment in understanding how ransomware attacks against governments can effectively constitute asymmetric warfare.
Case Study: Albania-Iran Cyber Conflict (July 2022)
1
Initial Attack
Iranian state-sponsored hackers (APT34/Eurofer) targeted Albanian government networks with sophisticated phishing campaigns and exploited unpatched vulnerabilities. The attack began two months before a scheduled conference of an Iranian opposition group in Albania, suggesting political motivation.
2
Deceptive Tactics
Attackers deployed ransomware as cover for a destructive wiper attack, creating a false narrative of criminal activity while actually conducting a state-sponsored operation. They used Living-off-the-Land techniques to avoid detection and established persistent backdoors in multiple systems.
3
Data Destruction
Malware wiped data and rendered government systems inoperable across multiple ministries including finance, interior affairs, and foreign services. Critical databases containing citizen information were corrupted, and backup systems were deliberately targeted to maximize damage and recovery time.
4
Diplomatic Crisis
Albania severed diplomatic ties with Iran - the first such case due to a cyber attack. Prime Minister Edi Rama announced the decision after NATO and US cyber forensics teams confirmed Iranian involvement, setting a precedent for how nations might respond to state-sponsored cyberattacks in the future.
In July 2022, Iranian-sponsored hackers deployed ransomware and wipers on Albanian government networks, forcing Albania to temporarily shut down online services. The comprehensive attack affected over 95% of government digital infrastructure and persisted for weeks. The destructive cyberattack on Albanian government networks used ransomware as cover, wiping data and causing Albania to suspend online public services and sever diplomatic ties with Iran. This marked the first known state-on-state cyberattack leading to a break in diplomatic relations. The United States Treasury Department subsequently imposed sanctions on Iran's Ministry of Intelligence and Security (MOIS) in direct response to the attack. Security researchers later identified a follow-up attack in September 2022, suggesting continued Iranian cyber operations against Albania despite international condemnation. This case study demonstrates the evolving nature of cyber warfare and its potential to trigger significant diplomatic and geopolitical consequences.
Case Study: Danish Energy Grid Breach (November 2023)
This significant cybersecurity incident represented one of the most concerning critical infrastructure breaches in Northern Europe in recent years, demonstrating the increasing willingness of state actors to target essential services and utilities.
Sophisticated Intrusion
Russian hackers (suspected to be APT28 or Sandworm) gained access to control systems of 22 regional power companies in Denmark through a command-injection software vulnerability. The attackers exploited unpatched systems in the operational technology (OT) network, bypassing standard IT security controls and leveraging legitimate credentials to move laterally through the networks. Their sophisticated techniques included custom malware that evaded detection by mimicking normal system processes.
Long-Term Access
Investigators revealed that the attackers had maintained access for months before discovery, mapping Denmark's decentralized electric grid infrastructure and establishing persistence. They deployed multiple backdoors and created dormant administrator accounts while carefully covering their tracks by modifying log files. Danish intelligence agencies eventually detected unusual data patterns through advanced threat hunting techniques, though only after significant system reconnaissance had occurred.
Potential Impact
While no outage was caused, security experts assessed that the attackers were positioning themselves to potentially disrupt power distribution during a future crisis or conflict. Technical analysis of the recovered malware showed capabilities similar to those used in the 2015 and 2016 Ukraine power grid attacks, including the ability to disable safety systems and trigger synchronized switching operations that could damage physical equipment. Simulation exercises indicated that a coordinated attack could have affected power delivery to up to 40% of Danish households during peak demand periods.
NATO Implications
The incident highlighted grid cyber vulnerabilities in NATO countries and prompted increased security coordination among European energy providers and defense organizations. Following the breach, NATO established a dedicated Critical Infrastructure Protection Task Force and Denmark implemented mandatory security audits for all energy sector operators. The European Network of Transmission System Operators for Electricity (ENTSO-E) updated its cybersecurity requirements, and several joint cyber defense exercises were conducted to improve resilience against similar future attacks targeting allied energy infrastructure.
This case demonstrates the evolution of cyber warfare tactics, where adversaries establish strategic positions within critical infrastructure without immediate disruption – creating potential leverage or "pre-positioned" capabilities that could be activated during geopolitical tensions. It underscores the need for enhanced operational technology security practices and cross-border information sharing about infrastructure threats among allied nations.
Case Study: Iran Gas Stations Cyberattack (December 2023)
1
1
Attack Execution
Israel-linked hackers target Iran's fuel payment systems, exploiting vulnerabilities in the centralized fuel management infrastructure. The attack involved sophisticated malware that specifically targeted the payment terminals.
2
2
Service Disruption
70% of Iran's gas stations rendered inoperable for nearly two weeks, with payment systems displaying messages criticizing the Iranian regime. The timing coincided with the anniversary of previous civil protests.
3
3
Civilian Impact
Long fuel queues and economic disruption nationwide affected millions of Iranians. Emergency services were prioritized for remaining fuel supplies while black market prices for gasoline soared up to 3x normal rates.
4
4
Pattern Recognition
Similar to a 2021 attack on Iran's fuel distribution network, suggesting intelligence agencies maintained persistent access to critical infrastructure systems. Analysts noted progressive sophistication in tactics between incidents.
In December 2023, Israel-linked operatives ("Altcaliber" hacktivist group) conducted a cyberattack that crippled 70% of Iran's gas stations, preventing fuel purchases. The attack caused days of payment system outages and long fuel queues. This operation was reportedly retaliation for Iranian regional aggression and echoed a similar 2021 incident, demonstrating cyber means to create real-world disruption of civilian infrastructure.
Iranian officials initially downplayed the incident as a "technical malfunction" before acknowledging the cyberattack. The Islamic Revolutionary Guard Corps (IRGC) subsequently announced heightened cyber defense measures and threatened counterstrikes against Israeli infrastructure. International cybersecurity firms identified telltale signatures in the attack code suggesting ties to intelligence services rather than independent hacktivists, despite the "Altcaliber" front. The incident highlighted the increasing use of civilian infrastructure as battlegrounds in regional conflicts and raised concerns about escalation risks in the ongoing "shadow war" between Iran and Israel.
Case Study: Kenya e-Citizen DDoS (July 2023)
5,000+
Services Affected
Government services hosted on the e-Citizen portal
7+
Attack Duration
Days of sustained distributed denial-of-service
$M
Economic Impact
Millions in economic losses from service disruption
In July 2023, Kenya suffered a major incident when the "Anonymous Sudan" group (likely a front for Russian actors) launched a sustained DDoS campaign against Kenya's e-Citizen portal. Services like online ID applications, bill pay, and even parts of the rail ticketing system went down. The attack also disrupted Kenya's M-Pesa mobile payments widely used by the public. It lasted over a week, causing economic losses and raising concerns of foreign influence in Africa via cyber means.
The attackers claimed the assault was retribution for alleged anti-Muslim statements by a Kenyan politician, though cybersecurity experts noted the sophisticated nature of the attack suggested state-backed capabilities. The e-Citizen platform, a crucial digital infrastructure serving over 5 million Kenyans, became virtually inaccessible as servers were overwhelmed with malicious traffic exceeding 300 Gbps at peak times. Government officials were forced to implement emergency mitigations, including traffic filtering and temporary geo-restrictions.
This case highlights the growing vulnerability of digital government services in developing nations to politically motivated cyberattacks. In the aftermath, Kenya accelerated its cybersecurity enhancement program and sought international assistance to strengthen critical infrastructure defenses. The incident also raised important questions about attribution challenges in cyberspace, as the "Anonymous Sudan" group's actual origins remain contested despite technical evidence pointing to Russian involvement or sponsorship.
Case Study: Hospital System Ransomware (USA, October 2023)

1

2

3

4

1
Initial Infection
Ransomware deployed across hospital network systems through a sophisticated phishing campaign targeting administrative staff. Within hours, critical systems began failing as encryption spread rapidly through connected networks.
2
Patient Care Impact
Emergency rooms forced to divert patients to other facilities, sometimes as far as 50+ miles away. Surgeries were postponed, and treatments requiring electronic equipment faced significant delays.
3
Records Inaccessibility
Electronic health records unavailable for days, preventing medical staff from accessing patient histories, medication records, and test results. This created dangerous treatment scenarios where clinicians had to make decisions with incomplete information.
4
Manual Fallback
Staff reverted to paper-based procedures and records, requiring rapid training for younger medical personnel unfamiliar with non-digital workflows. This significantly slowed treatment processes and increased the risk of medical errors.
A coordinated ransomware attack hit a chain of hospitals across several U.S. states, encrypting patient data and demanding millions in cryptocurrency payment. Emergency rooms had to divert patients, and electronic health records were inaccessible for days, creating potentially life-threatening situations. While not publicly attributed to a nation-state, officials noted possible ties to actors operating from Russia or Iran due to similar tactics, infrastructure, and timing that matched previous campaigns. The hospital chain ultimately spent over $10 million on recovery efforts, including cybersecurity improvements, and faced lawsuits from patients whose care was compromised. This incident underscored ransomware risk to life-critical services and the potential for cybercriminal activities to impact public health and safety, leading to renewed calls for stronger regulatory frameworks for critical infrastructure protection. The attack also highlighted the crucial importance of offline backups and regularly practiced fallback procedures for healthcare organizations.
Future Trends and Concerns
AI-Powered Attacks
Machine learning will enhance both offensive and defensive capabilities, potentially creating more sophisticated phishing, faster vulnerability discovery, and automated attack tools. AI systems can now generate convincing deepfakes for social engineering, analyze massive datasets to identify patterns of vulnerability, and launch persistent, adaptive attacks that evolve to bypass defenses. Meanwhile, defensive AI must increasingly contend with adversarial machine learning techniques designed to confuse automated security systems.
Space Asset Targeting
Increased reliance on satellite infrastructure makes these systems attractive targets for disruption during conflicts. Critical services including GPS navigation, weather forecasting, communications, and military intelligence all depend on vulnerable space-based assets. Recent incidents have demonstrated capabilities for satellite jamming, spoofing, and even physical kinetic attacks. The lack of international norms governing conflict in space further complicates security postures and incident response capabilities.
Supply Chain Vulnerabilities
Hardware and software supply chains will continue to be exploited as entry points into otherwise secure systems. Attackers increasingly target trusted vendors, open-source repositories, and development pipelines to insert backdoors or compromise components before they reach end users. The globally distributed nature of technology production creates numerous points of potential compromise, from chip manufacturing to software library dependencies. Organizations struggle to validate the security of thousands of components in even basic systems.
Cyber Sovereignty Tensions
Competing visions of internet governance and national control will create further fragmentation of cyberspace. Countries are increasingly implementing data localization requirements, content filtering, and national firewalls that challenge the original borderless vision of the internet. This balkanization threatens to create incompatible regulatory environments, technical standards, and access controls that complicate international business operations and potentially isolate digital populations. These divergent approaches also undermine coordinated international responses to cyber threats.
Quantum Computing Threats
Future quantum capabilities could break current encryption, creating a "harvest now, decrypt later" incentive for data theft. Organizations face the challenge of transitioning to quantum-resistant algorithms before operational quantum computers render current public-key cryptography obsolete. Sensitive data with long-term value – including intellectual property, state secrets, financial records, and personally identifiable information – remains at risk even when encrypted with today's standards. The race to develop post-quantum cryptography has become a national security priority for many countries.
Recommendations for Organizations

1

2

3

4

5

1
Strategic Leadership
Executive-level commitment to cybersecurity
2
Security Culture
Comprehensive awareness training for all personnel
3
Technical Controls
Multi-factor authentication, encryption, and zero trust
4
Resilience Planning
Tested backup, recovery, and continuity procedures
5
Collaborative Defense
Information sharing with industry and government
Organizations should implement a multi-layered defense strategy that addresses both technical and human factors. Strategic leadership requires board-level oversight of cybersecurity programs, dedicated security budgets, and clear accountability frameworks for cyber risk management. Security culture must be built through regular training exercises, simulated phishing campaigns, and reward systems for security-conscious behaviors.
Technical controls should include zero trust architecture implementation that requires verification from anyone trying to access resources, strong encryption for both data in transit and at rest, and robust identity and access management solutions. Organizations must enforce least-privilege access principles and segment networks to contain potential breaches.
Resilience planning necessitates maintaining immutable offline backups, implementing 3-2-1 backup strategies (three copies on two different media with one copy offsite), and conducting regular tabletop exercises to test incident response capabilities. Recovery time objectives (RTOs) and recovery point objectives (RPOs) should be clearly defined for critical systems.
Collaborative defense involves active participation in information sharing and analysis centers (ISACs), public-private partnerships, and threat intelligence communities. Organizations should establish secure channels for sharing indicators of compromise, emerging threats, and successful mitigation strategies with trusted partners and government agencies. Proactive threat hunting and assuming breach mentality are essential for detecting sophisticated attackers before they can cause significant damage or data exfiltration.
Conclusion: The Evolving Cyber Battlespace
Persistent Conflict
The global state of cyber warfare in 2023–2024 is one of persistent, multi-faceted conflict that spans espionage, crime, and outright sabotage. State-sponsored cyber units continue to quietly penetrate networks worldwide in search of strategic intelligence, even as some have shown they can turn off the lights or disrupt civilian life when geopolitically expedient. This new form of constant engagement occurs below the threshold of armed conflict but carries increasingly severe real-world consequences. Critical infrastructure, government systems, and corporate networks face sophisticated attacks daily, with techniques evolving faster than defenses can adapt.
Non-State Impact
Non-state actors – from profit-driven ransomware cartels to cause-driven hacktivists – have proven capable of causing crises and contributing to international instability. The blurring lines between state and criminal activity further complicate the threat landscape. Ransomware gangs operate with near impunity from safe haven countries, sometimes with tacit state approval. Meanwhile, hacktivist collectives have inserted themselves into geopolitical conflicts, conducting disruptive operations that amplify tensions and complicate diplomatic efforts. The democratization of advanced attack tools has lowered barriers to entry, allowing even less sophisticated actors to cause significant harm.
Defensive Progress
On the positive side, awareness of these threats is at an all-time high, and unprecedented collaboration is underway to counter them. Governments are sharing threat intelligence, issuing joint advisories, and even conducting combined operations to takedown cyber threats. The private sector has stepped up as well, with major technology companies investing billions in security research and infrastructure protection. New frameworks like zero trust architecture are gaining traction, while advances in AI-powered defenses show promise in detecting sophisticated attacks. Public-private partnerships have matured from talking points to operational realities, creating more resilient defensive ecosystems.
Ongoing Challenges
Yet, the challenge is enormous: the attack surface keeps expanding with digital transformation, and attackers only need to find one gap. Attribution and punishment of bad actors lag behind the speed of attacks, undercutting deterrence. Cyber norms are still being defined, and as seen, they can be brazenly ignored by aggressive actors. The talent shortage in cybersecurity remains acute, with millions of positions unfilled globally. Regulatory frameworks struggle to keep pace with technological change, creating compliance challenges without necessarily improving security postures. Meanwhile, emerging technologies like quantum computing threaten to undermine current encryption standards, potentially creating new vulnerabilities in critical systems.
Future Outlook
Looking ahead, the cyber domain will likely become even more contested as digital dependencies deepen. Nation-states are investing heavily in offensive capabilities while simultaneously working to secure their own critical infrastructure. International efforts to establish binding norms may eventually bear fruit, but progress will be uneven. The integration of AI into both offensive and defensive operations promises to accelerate the tempo of cyber conflicts, potentially outpacing human decision-making processes. Organizations and governments that adapt quickly, building both technical capabilities and strategic resilience, will be best positioned to navigate this increasingly complex landscape.