Cyber Intelligence
   HOME

TheInfoList



OR:

Cyberwarfare is the use of
cyber attacks A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
against an enemy
state State most commonly refers to: * State (polity), a centralized political organization that regulates law and society within a territory **Sovereign state, a sovereign polity in international law, commonly referred to as a country **Nation state, a ...
, causing comparable harm to actual
warfare War is an armed conflict between the armed forces of State (polity), states, or between governmental forces and armed groups that are organized under a certain command structure and have the capacity to sustain military operations, or betwe ...
and/or disrupting vital
computer systems A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
. Some intended outcomes could be
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
,
sabotage Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization (warfare), demoralization, destabilization, divide and rule, division, social disruption, disrupti ...
,
propaganda Propaganda is communication that is primarily used to influence or persuade an audience to further an agenda, which may not be objective and may be selectively presenting facts to encourage a particular synthesis or perception, or using loaded l ...
, manipulation or
economic warfare Economic warfare or economic war is an economic strategy used by belligerent states with the goal of weakening the economy of other states. This is primarily achieved by the use of economic blockades. Ravaging the crops of the enemy is a classic ...
. There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. One view is that the term is a misnomer since no cyber attacks to date could be described as a war. An alternative view is that it is a suitable label for cyber attacks which cause physical damage to people and objects in the real world. Many countries, including the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
,
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
,
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
,
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
,
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
,
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, and
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and borders China and Russia to the north at the Yalu River, Yalu (Amnok) an ...
, have active cyber capabilities for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities, the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains. The first instance of
kinetic military action Kinetic warfare is a term for military combat or other forms of directly-destructive warfare, to contrast "soft" force such as diplomacy, lawfare, sanctions, cyberwarfare, psychological warfare, information warfare, or other types of warfare. ...
used in response to a cyber-attack resulting in the loss of human life was observed on 5 May 2019, when the
Israel Defense Forces The Israel Defense Forces (IDF; , ), alternatively referred to by the Hebrew-language acronym (), is the national military of the State of Israel. It consists of three service branches: the Israeli Ground Forces, the Israeli Air Force, and ...
targeted and destroyed a building associated with an ongoing cyber-attack.


Definition

There is ongoing debate over how cyberwarfare should be defined and no absolute definition is widely agreed upon. While the majority of scholars, militaries, and governments use definitions that refer to state and state-sponsored actors, other definitions may include non-state actors, such as terrorist groups, companies, political or ideological extremist groups,
hacktivist Hacktivism (or hactivism; a portmanteau of '' hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roo ...
s, and transnational criminal organizations depending on the context of the work. Examples of definitions proposed by experts in the field are as follows. Raymond Charles Parks and David P. Duggan focused on analyzing cyberwarfare in terms of computer networks and pointed out that "Cyberwarfare is a combination of computer network attack and defense and special technical operations." According to this perspective, the notion of cyber warfare brings a new paradigm into military doctrine.
Paulo Shakarian Paulo Shakarian is an associate professor at Arizona State University where he leads Lab V2 which is focused on neurosymbolic artificial intelligence. His work on artificial intelligence and security has been featured in Forbes, the New Yorker, ...
and colleagues put forward the following definition of "cyber war" in 2013, drawing on
Clausewitz Carl Philipp Gottlieb von Clausewitz ( , ; born Carl Philipp Gottlieb Clauswitz; 1 July 1780 – 16 November 1831) was a Prussian general and military theorist who stressed the "moral" (in modern terms meaning psychological) and political aspe ...
's definition of war: "War is the continuation of politics by other means": Taddeo offered the following definition in 2012: Robinson et al. proposed in 2015 that the intent of the attacker dictates whether an attack is warfare or not, defining cyber warfare as "the use of cyber attacks with a warfare-like intent." In 2010, the former US National Coordinator for Security, Infrastructure Protection and Counter-terrorism,
Richard A. Clarke Richard Alan Clarke (born October 27, 1950) is an American national security expert, novelist, and former government official. He served as the Counterterrorism Czar for the National Coordinator for Security, Infrastructure Protection, and C ...
, defined cyberwarfare as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption".Clarke, Richard A. ''Cyber War'', HarperCollins (2010) The target's own cyber-physical infrastructure may be used by the adversary in case of a cyber conflict, thus weaponizing it.


Controversy of term

There is debate on whether the term "cyber warfare" is accurate. In 2012,
Eugene Kaspersky Yevgeny Valentinovich Kaspersky (; born 4 October 1965) is a Russian cybersecurity expert and the CEO of Kaspersky Lab, an IT security company with 4,000 employees. He co-founded Kaspersky Lab in 1997 and helped identify instances of government-s ...
, founder of
Kaspersky Lab Kaspersky Lab (; ) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky a ...
, concluded that "
cyberterrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside th ...
" is a more accurate term than "cyberwar." He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism.""Latest viruses could mean 'end of the world as we know it,' says the man who discovered Flame"
''The Times of Israel'', 6 June 2012
Howard Schmidt Howard Anthony Schmidt (October 5, 1949 – March 2, 2017) was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in ...
, former Cyber Security Coordinator in the
Obama administration Barack Obama's tenure as the 44th president of the United States began with his first inauguration on January 20, 2009, and ended on January 20, 2017. Obama, a Democrat from Illinois, took office following his victory over Republican nomine ...
, said that "there is no cyberwar... I think that is a terrible metaphor and I think that is a terrible concept. There are no winners in that environment." Some experts take issue with the possible consequences linked to the warfare goal. In 2011, Ron Deibert, of Canada's
Citizen Lab The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs at the University of Toronto, Canada. It was founded by Ronald Deibert in 2001. The laboratory studies information controls that impact the openness an ...
, warned of a "
militarization of cyberspace Internet militarization is the use of the Internet and its platforms by states in order to ensure state security domestically as well as protect itself from any external attack. Over time, the co-constitution of state’s strategies and technologi ...
", as militaristic responses may not be appropriate. However, to date, even serious cyber-attacks that have disrupted large parts of a nation's electrical grid (230,000 customers, Ukraine, 2015) or affected access to medical care, thus endangering life (UK
National Health Service The National Health Service (NHS) is the term for the publicly funded health care, publicly funded healthcare systems of the United Kingdom: the National Health Service (England), NHS Scotland, NHS Wales, and Health and Social Care (Northern ...
, WannaCry, 2017) have not led to military action. In 2017,
Oxford Oxford () is a City status in the United Kingdom, cathedral city and non-metropolitan district in Oxfordshire, England, of which it is the county town. The city is home to the University of Oxford, the List of oldest universities in continuou ...
academic Lucas Kello proposed a new term, "Unpeace", to denote highly damaging cyber actions whose non-violent effects do not rise to the level of traditional war. Such actions are neither warlike nor peace-like. Although they are non-violent, and thus not acts of war, their damaging effects on the economy and society may be greater than those of some armed attacks. This term is closely related to the concept of the " grey zone", which came to prominence in 2017, describing hostile actions that fall below the traditional threshold of war. But as Kello explained, technological unpeace differs from the grey zone as the term is commonly used in that unpeace by definition is never overtly violent or fatal, whereas some grey-zone actions are violent, even if they are not acts of war.


Cyberwarfare vs. cyber war

The term "cyberwarfare" is distinct from the term "cyber war". Cyberwarfare includes techniques, tactics and procedures that may be involved in a cyber war, but the term does not imply scale, protraction or violence, which are typically associated with the term "war", which inherently refers to a large-scale action, typically over a protracted period of time, and may include objectives seeking to utilize violence or the aim to kill. A cyber war could accurately describe a protracted period of back-and-forth cyber attacks (including in combination with traditional military action) between warring states. To date, no such action is known to have occurred. Instead, armed forces have responded with
tit-for-tat Tit for tat is an English saying meaning "equivalent retaliation". It is an alternation (linguistics), alternation of ''wikt:tip#Noun 3, tip for wikt:tap#Verb 2, tap'' "blow for blow", first recorded in 1558. It is also a highly effective strat ...
military cyber actions. For example, in June 2019, the United States launched a cyber attack against Iranian weapons systems in retaliation to the shooting down of a US drone in the
Strait of Hormuz The Strait of Hormuz ( ''Tangeh-ye Hormoz'' , ''Maḍīq Hurmuz'') is a strait between the Persian Gulf and the Gulf of Oman. It provides the only sea passage from the Persian Gulf to the open ocean and is one of the world's most strategica ...
.


Cyberwarfare and cyber sanctions

In addition to retaliatory digital attacks, countries can respond to cyber attacks with cyber sanctions. Sometimes, it is not easy to detect the attacker, but suspicions may focus on a particular country or group of countries. In these cases, unilateral and multilateral economic sanctions can be used instead of cyberwarfare. For example, the United States has frequently imposed economic sanctions related to cyber attacks. Two
Executive Order In the United States, an executive order is a directive by the president of the United States that manages operations of the federal government. The legal or constitutional basis for executive orders has multiple sources. Article Two of the ...
s issued during the
Obama administration Barack Obama's tenure as the 44th president of the United States began with his first inauguration on January 20, 2009, and ended on January 20, 2017. Obama, a Democrat from Illinois, took office following his victory over Republican nomine ...
, EO 13694 of 2015 and EO 13757 of 2016, specifically focused on the implementation of the cyber sanctions. Subsequent US presidents have issued similar Executive Orders. The
US Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
has also imposed cyber sanctions in response to cyberwarfare. For example, the Iran Cyber Sanctions Act of 2016 imposes sanctions on specific individuals responsible for cyber attacks.


Types of threat


Types of warfare

Cyber warfare can present a multitude of threats towards a nation. At the most basic level, cyber attacks can be used to support traditional warfare. For example, tampering with the operation of air defenses via cyber means in order to facilitate an air attack. Aside from these "hard" threats, cyber warfare can also contribute towards "soft" threats such as espionage and propaganda.
Eugene Kaspersky Yevgeny Valentinovich Kaspersky (; born 4 October 1965) is a Russian cybersecurity expert and the CEO of Kaspersky Lab, an IT security company with 4,000 employees. He co-founded Kaspersky Lab in 1997 and helped identify instances of government-s ...
, founder of
Kaspersky Lab Kaspersky Lab (; ) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky a ...
, equates large-scale cyber weapons, such as
Flame A flame () is the visible, gaseous part of a fire. It is caused by a highly exothermic chemical reaction made in a thin zone. When flames are hot enough to have ionized gaseous components of sufficient density, they are then considered plasm ...
and NetTraveler which his company discovered, to
biological weapons Biological agents, also known as biological weapons or bioweapons, are pathogens used as weapons. In addition to these living or replicating pathogens, toxins and biotoxins are also included among the bio-agents. More than 1,200 different kin ...
, claiming that in an interconnected world, they have the potential to be equally destructive."Cyber espionage bug attacking Middle East, but Israel untouched — so far"
''The Times of Israel'', 4 June 2013


Espionage

Traditional espionage is not an act of war, nor is cyber-espionage, and both are generally assumed to be ongoing between major powers. Despite this assumption, some incidents can cause serious tensions between nations, and are often described as "attacks". For example: * Massive spying by the US on many countries, revealed by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
. * After the NSA's spying on Germany's Chancellor
Angela Merkel Angela Dorothea Merkel (; ; born 17 July 1954) is a German retired politician who served as Chancellor of Germany from 2005 to 2021. She is the only woman to have held the office. She was Leader of the Opposition from 2002 to 2005 and Leade ...
was revealed, the Chancellor compared the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
with the
Stasi The Ministry for State Security (, ; abbreviated MfS), commonly known as the (, an abbreviation of ), was the Intelligence agency, state security service and secret police of East Germany from 1950 to 1990. It was one of the most repressive pol ...
. * The NSA recording nearly every cell phone conversation in the
Bahamas The Bahamas, officially the Commonwealth of The Bahamas, is an archipelagic and island country within the Lucayan Archipelago of the Atlantic Ocean. It contains 97 per cent of the archipelago's land area and 88 per cent of its population. ...
, without the Bahamian government's permission, and similar programs in
Kenya Kenya, officially the Republic of Kenya, is a country located in East Africa. With an estimated population of more than 52.4 million as of mid-2024, Kenya is the 27th-most-populous country in the world and the 7th most populous in Africa. ...
, the
Philippines The Philippines, officially the Republic of the Philippines, is an Archipelagic state, archipelagic country in Southeast Asia. Located in the western Pacific Ocean, it consists of List of islands of the Philippines, 7,641 islands, with a tot ...
,
Mexico Mexico, officially the United Mexican States, is a country in North America. It is the northernmost country in Latin America, and borders the United States to the north, and Guatemala and Belize to the southeast; while having maritime boundar ...
and
Afghanistan Afghanistan, officially the Islamic Emirate of Afghanistan, is a landlocked country located at the crossroads of Central Asia and South Asia. It is bordered by Pakistan to the Durand Line, east and south, Iran to the Afghanistan–Iran borde ...
. * The "
Titan Rain Titan Rain was a series of coordinated attacks on computer systems in the United States since 2003; they were known to have been ongoing for at least three years. The attacks originated in Guangdong, China. The activity is believed to be associat ...
" probes of American defense contractors computer systems since 2003.Bodmer, Kilger, Carpenter, & Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. , * The
Office of Personnel Management data breach The Office of Personnel Management data breach was a 2015 data breach targeting Standard Form 86 (SF-86) U.S. government security clearance records retained by the United States Office of Personnel Management (OPM). One of the largest breaches of ...
, in the US, widely attributed to China. * The security firm Area 1 published details of a breach that compromised one of the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
's diplomatic communication channels for three years. Out of all cyber attacks, 25% of them are espionage based.


Sabotage

Computers and
satellites A satellite or an artificial satellite is an object, typically a spacecraft, placed into orbit around a celestial body. They have a variety of uses, including communication relay, weather forecasting, navigation ( GPS), broadcasting, scientif ...
that coordinate other activities are vulnerable components of a system and could lead to the disruption of equipment. Compromise of military systems, such as C4ISTAR components that are responsible for orders and communications could lead to their interception or malicious replacement. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to disruption. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market."Clarke: More defense needed in cyberspace"
HometownAnnapolis.com, 24 September 2010
In mid-July 2010, security experts discovered a malicious software program called
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes ''The New York Times''.
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
, while extremely effective in delaying
Iran's nuclear program The Nuclear technology, nuclear program of Iran is one of the most scrutinized nuclear programs in the world. The military capabilities of the program are possible through its mass Enriched uranium, enrichment activities in facilities such a ...
for the development of nuclear weaponry, came at a high cost. For the first time, it became clear that not only could cyber weapons be defensive but they could be offensive. The large decentralization and scale of cyberspace makes it extremely difficult to direct from a policy perspective. Non-state actors can play as large a part in the cyberwar space as state actors, which leads to dangerous, sometimes disastrous, consequences. Small groups of highly skilled malware developers are able to as effectively impact global politics and cyber warfare as large governmental agencies. A major aspect of this ability lies in the willingness of these groups to share their exploits and developments on the web as a form of arms proliferation. This allows lesser hackers to become more proficient in creating the large scale attacks that once only a small handful were skillful enough to manage. In addition, thriving black markets for these kinds of cyber weapons are buying and selling these cyber capabilities to the highest bidder without regard for consequences.


Denial-of-service attack

In computing, a denial-of-service attack (
DoS DOS (, ) is a family of disk-based operating systems for IBM PC compatible computers. The DOS family primarily consists of IBM PC DOS and a rebranded version, Microsoft's MS-DOS, both of which were introduced in 1981. Later compatible syste ...
attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. DoS attacks often leverage internet-connected devices with vulnerable security measures to carry out these large-scale attacks. DoS attacks may not be limited to computer-based methods, as strategic physical attacks against infrastructure can be just as devastating. For example, cutting undersea communication cables may severely cripple some regions and countries with regards to their information warfare ability.


Electrical power grid

The
federal government of the United States The Federal Government of the United States of America (U.S. federal government or U.S. government) is the Federation#Federal governments, national government of the United States. The U.S. federal government is composed of three distinct ...
admits that the
electric power grid An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
is susceptible to cyberwarfare. The
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the Interior minister, interior, Home Secretary ...
works with industries to identify
vulnerabilities Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
and to help industries enhance the security of control system networks. The federal government is also working to ensure that security is built in as the next generation of "smart grid" networks are developed. In April 2009, reports surfaced that China and Russia had infiltrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national security officials. The
North American Electric Reliability Corporation The North American Electric Reliability Corporation (NERC) is a nonprofit corporation based in Atlanta, Georgia, and formed on March 28, 2006, as the successor to the North American Electric Reliability Council (also known as NERC). The original ...
(NERC) has issued a public notice that warns that the electrical grid is not adequately protected from cyber attack. China denies intruding into the U.S. electrical grid. One
countermeasure A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
would be to disconnect the power grid from the Internet and run the net with
droop speed control Droop speed control is a control mode used for AC electrical power generators, whereby the power output of a generator reduces as the line frequency increases. It is commonly used as the speed control mode of the governor of a prime mover driving ...
only. Massive
power outage A power outage, also called a blackout, a power failure, a power blackout, a power loss, a power cut, or a power out is the complete loss of the electrical power network supply to an end user. There are many causes of power failures in an el ...
s caused by a cyber attack could disrupt the economy, distract from a simultaneous military attack, or create a national trauma. Iranian hackers, possibly
Iranian Cyber Army The Iranian Cyber Army is an Iranian computer hacker group. It is thought to be connected to the Iranian government, although it is not officially recognized as an entity by the government. It is believed that Iranian Cyber Army derives portion of ...
pushed a massive power outage for 12 hours in 44 of 81 provinces of
Turkey Turkey, officially the Republic of Türkiye, is a country mainly located in Anatolia in West Asia, with a relatively small part called East Thrace in Southeast Europe. It borders the Black Sea to the north; Georgia (country), Georgia, Armen ...
, impacting 40 million people.
Istanbul Istanbul is the List of largest cities and towns in Turkey, largest city in Turkey, constituting the country's economic, cultural, and historical heart. With Demographics of Istanbul, a population over , it is home to 18% of the Demographics ...
and
Ankara Ankara is the capital city of Turkey and List of national capitals by area, the largest capital by area in the world. Located in the Central Anatolia Region, central part of Anatolia, the city has a population of 5,290,822 in its urban center ( ...
were among the places suffering blackout.
Howard Schmidt Howard Anthony Schmidt (October 5, 1949 – March 2, 2017) was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in ...
, former Cyber-Security Coordinator of the US, commented on those possibilities:"White House Cyber Czar: 'There Is No Cyberwar'"
''
Wired Wired may refer to: Arts, entertainment, and media Music * ''Wired'' (Jeff Beck album), 1976 * ''Wired'' (Hugh Cornwell album), 1993 * ''Wired'' (Mallory Knox album), 2017 * "Wired", a song by Prism from their album '' Beat Street'' * "Wired ...
'', 4 March 2010
In June 2019,
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
said that its
electrical grid An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
has been under cyber-attack by the United States. The ''New York Times'' reported that American hackers from the
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
planted malware potentially capable of disrupting the Russian electrical grid.


Propaganda

Cyber propaganda is an effort to control information in whatever form it takes, and influence public opinion. It is a form of
psychological warfare Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), has been known by many other names or terms, including Military Information Support Operations ( MISO), Psy Ops, political warfare, "Hearts and Mi ...
, except it uses
social media Social media are interactive technologies that facilitate the Content creation, creation, information exchange, sharing and news aggregator, aggregation of Content (media), content (such as ideas, interests, and other forms of expression) amongs ...
,
fake news website Fake news websites (also referred to as hoax news websites) are websites on the Internet that deliberately publish fake news—hoaxes, propaganda, and disinformation purporting to be news, real news—often using social media to drive web traffic ...
s and other digital means. In 2018, Sir Nicholas Carter, Chief of the General Staff of the
British Army The British Army is the principal Army, land warfare force of the United Kingdom. the British Army comprises 73,847 regular full-time personnel, 4,127 Brigade of Gurkhas, Gurkhas, 25,742 Army Reserve (United Kingdom), volunteer reserve perso ...
stated that this kind of attack from actors such as Russia "is a form of system warfare that seeks to de-legitimize the political and social system on which our military strength is based". Jowell and O'Donnell (2006) state that "propaganda is the deliberate, systematic attempt to shape perceptions, manipulate cognitions, and direct behavior to achieve a response that furthers the desired intent of the propagandist" (p. 7). The internet is the most important means of communication today. People can convey their messages quickly across to a huge audience, and this can open a window for evil. Terrorist organizations can exploit this and may use this medium to brainwash people. It has been suggested that restricted media coverage of terrorist attacks would in turn decrease the number of terrorist attacks that occur afterwards.


Economic disruption

In 2017, the
WannaCry The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the form ...
and Petya (NotPetya) cyber attacks, masquerading as
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
, caused large-scale disruptions in
Ukraine Ukraine is a country in Eastern Europe. It is the List of European countries by area, second-largest country in Europe after Russia, which Russia–Ukraine border, borders it to the east and northeast. Ukraine also borders Belarus to the nor ...
as well as to the U.K.'s National Health Service, pharmaceutical giant Merck,
Maersk (), usually known simply as Maersk ( ), is a Danish Freight transport, shipping and logistics company founded in 1904 by Arnold Peter Møller and his father Peter Mærsk Møller. Maersk's business activities include Port operator, port operat ...
shipping company and other organizations around the world. These attacks are also categorized as
cybercrime Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
s, specifically financial crime because they negatively affect a company or group.


Surprise cyber attack

The idea of a "cyber
Pearl Harbor Pearl Harbor is an American lagoon harbor on the island of Oahu, Hawaii, west of Honolulu. It was often visited by the naval fleet of the United States, before it was acquired from the Hawaiian Kingdom by the U.S. with the signing of the Reci ...
" has been debated by scholars, drawing an analogy to the historical act of war. Others have used "cyber
9/11 The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
" to draw attention to the nontraditional, asymmetric, or irregular aspect of cyber action against a state.
Link
at '' SFGate'')


Motivations

There are a number of reasons nations undertake offensive cyber operations. , a cyber security expert and adviser to
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
, advocates that states take cyber warfare seriously as they are viewed as an attractive activity by many nations, in times of war and peace. Offensive cyber operations offer a large variety of cheap and risk-free options to weaken other countries and strengthen their own positions. Considered from a long-term, geostrategic perspective, cyber offensive operations can cripple whole economies, change political views, agitate conflicts within or among states, reduce their military efficiency and equalize the capacities of high-tech nations to that of low-tech nations, and use access to their critical infrastructures to blackmail them.


Military

With the emergence of cyber as a substantial threat to national and global security, cyber war, warfare and/or attacks also became a domain of interest and purpose for the military. In the U.S., General Keith B. Alexander, first head of
USCYBERCOM United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
, told the
Senate Armed Services Committee The Committee on Armed Services, sometimes abbreviated SASC for Senate Armed Services Committee, is a committee of the United States Senate empowered with legislative oversight of the nation's military, including the Department of Defen ...
that computer network warfare is evolving so rapidly that there is a "mismatch between our technical capabilities to conduct operations and the governing laws and policies.
Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrat ...
is the newest global combatant and its sole mission is cyberspace, outside the traditional battlefields of land, sea, air and space." It will attempt to find and, when necessary, neutralize cyberattacks and to defend military computer networks. Alexander sketched out the broad battlefield envisioned for the computer warfare command, listing the kind of targets that his new headquarters could be ordered to attack, including "traditional battlefield prizes – command-and-control systems at military headquarters, air defense networks and weapons systems that require computers to operate.""Cyber-War Nominee Sees Gaps in Law"
''The New York Times'', 14 April 2010
One cyber warfare scenario, Cyber-ShockWave, which was
wargame A normal wargame is a strategy game in which two or more players command opposing armed forces in a simulation of an armed conflict. Wargaming may be played for Recreational wargaming, recreation, to train military officers in the art of milit ...
d on the cabinet level by former administration officials, raised issues ranging from the
National Guard National guard is the name used by a wide variety of current and historical uniformed organizations in different countries. The original National Guard was formed during the French Revolution around a cadre of defectors from the French Guards. ...
to the
power grid ''Power Grid'' is the English-language version of the second edition of the multiplayer German-style board game ''Funkenschlag'', designed by Friedemann Friese and first released in 2004. ''Power Grid'' was released by Rio Grande Games. I ...
to the limits of statutory authority. The distributed nature of internet based attacks means that it is difficult to determine motivation and attacking party, meaning that it is unclear when a specific act should be considered an act of war. Examples of cyberwarfare driven by political motivations can be found worldwide. In 2008, Russia began a cyber attack on the Georgian government website, which was carried out along with Georgian military operations in South Ossetia. In 2008, Chinese "nationalist
hackers A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bugs or exploits to break ...
" attacked
CNN Cable News Network (CNN) is a multinational news organization operating, most notably, a website and a TV channel headquartered in Atlanta. Founded in 1980 by American media proprietor Ted Turner and Reese Schonfeld as a 24-hour cable ne ...
as it reported on Chinese repression on
Tibet Tibet (; ''Böd''; ), or Greater Tibet, is a region in the western part of East Asia, covering much of the Tibetan Plateau and spanning about . It is the homeland of the Tibetan people. Also resident on the plateau are other ethnic groups s ...
. Hackers from
Armenia Armenia, officially the Republic of Armenia, is a landlocked country in the Armenian Highlands of West Asia. It is a part of the Caucasus region and is bordered by Turkey to the west, Georgia (country), Georgia to the north and Azerbaijan to ...
and
Azerbaijan Azerbaijan, officially the Republic of Azerbaijan, is a Boundaries between the continents, transcontinental and landlocked country at the boundary of West Asia and Eastern Europe. It is a part of the South Caucasus region and is bounded by ...
have actively participated in cyberwarfare as part of the
Nagorno-Karabakh conflict The Nagorno-Karabakh conflict is an ethnic and territorial conflict between Armenia and Azerbaijan over the region of Nagorno-Karabakh, inhabited mostly by ethnic Armenians until 2023, and seven surrounding districts, inhabited mostly by Azerbai ...
, with Azerbaijani hackers targeting Armenian websites and posting
Ilham Aliyev Ilham Heydar Oghlu Aliyev (born 24 December 1961) is an Azerbaijani politician who has been the fourth president of Azerbaijan since 2003. He is also the leader of the New Azerbaijan Party since 2005. The son and second child of former Aze ...
's statements. Jobs in cyberwarfare have become increasingly popular in the military. All four branches of the United States military actively recruit for cyber warfare positions. In a 2024 study on the use of military cyber operations during the
Russo-Ukrainian War The Russo-Ukrainian War began in February 2014 and is ongoing. Following Ukraine's Revolution of Dignity, Russia Russian occupation of Crimea, occupied and Annexation of Crimea by the Russian Federation, annexed Crimea from Ukraine. It then ...
, Frederik A. H. Pedersen and Jeppe T. Jacobsen concluded that cyber operations in warfare may only be impactful on the
tactical Tactic(s) or Tactical may refer to: * Tactic (method), a conceptual action implemented as one or more specific tasks ** Military tactics, the disposition and maneuver of units on a particular sea or battlefield ** Chess tactics ** Political tact ...
and operational levels in a war's beginning, when cyber and non-cyber operations can be aligned and complex cyber weapons can be prepared before war breaks out, as well as cumulatively on a strategic level.


Civil

Potential targets in internet sabotage include all aspects of the Internet from the backbones of the web, to the
internet service provider An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, no ...
s, to the varying types of data communication mediums and network equipment. This would include: web servers, enterprise information systems, client server systems, communication links, network equipment, and the desktops and laptops in businesses and homes.
Electrical grid An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
s, financial networks, and
telecommunications system Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communication technologies. These means of ...
s are also deemed vulnerable, especially due to current trends in computerization and automation.


Hacktivism

Politically motivated
hacktivism Hacktivism (or hactivism; a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roots ...
involves the subversive use of computers and
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
s to promote an agenda, and can potentially extend to attacks, theft and virtual sabotage that could be seen as cyberwarfare – or mistaken for it. Hacktivists use their knowledge and software tools to gain unauthorized access to computer systems they seek to manipulate or damage not for material gain or to cause widespread destruction, but to draw attention to their cause through well-publicized disruptions of select targets. Anonymous and other hacktivist groups are often portrayed in the media as cyber-terrorists, wreaking havoc by hacking websites, posting sensitive information about their victims, and threatening further attacks if their demands are not met. However, hacktivism is more than that. Actors are politically motivated to change the world, through the use of fundamentalism. Groups like Anonymous, however, have divided opinion with their methods.


Income generation

Cyber attacks, including ransomware, can be used to generate income. States can use these techniques to generate significant sources of income, which can evade sanctions and perhaps while simultaneously harming adversaries (depending on targets). This tactic was observed in August 2019 when it was revealed North Korea had generated $2 billion to fund its weapons program, avoiding the blanket of sanctions levied by the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
,
United Nations The United Nations (UN) is the Earth, global intergovernmental organization established by the signing of the Charter of the United Nations, UN Charter on 26 June 1945 with the stated purpose of maintaining international peace and internationa ...
and the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
.


Private sector

Computer hacking represents a modern threat in ongoing global conflicts and
industrial espionage Industrial espionage, also known as economic espionage, corporate spying, or corporate espionage, is a form of espionage conducted for commercial purposes instead of purely national security. While political espionage is conducted or orchestrat ...
and as such is presumed to widely occur. It is typical that this type of crime is underreported to the extent they are known. According to McAfee's George Kurtz, corporations around the world face millions of cyberattacks a day. "Most of these attacks don't gain any media attention or lead to strong political statements by victims.""Google Attack Is Tip Of Iceberg"
McAfee Security Insights, 13 January 2010
This type of crime is usually financially motivated.


Non-profit research

But not all those who engage in cyberwarfare do so for financial or ideological reasons. There are institutes and companies like the
University of Cincinnati The University of Cincinnati (UC or Cincinnati, informally Cincy) is a public university, public research university in Cincinnati, Ohio, United States. It was founded in 1819 and had an enrollment of over 53,000 students in 2024, making it the ...
or the Kaspersky Security Lab which engage in cyberwarfare so as to better understand the field through actions like the researching and publishing of new security threats.


Preparedness

A number of countries conduct exercise to increase preparedness and explore the strategy, tactics and operations involved in conducting and defending against cyber attacks against hostile states, this is typically done in the form of
war games A normal wargame is a strategy game in which two or more players command opposing armed forces in a simulation of an armed conflict. Wargaming may be played for recreation, to train military officers in the art of strategic thinking, or to st ...
. The Cooperative Cyber Defence Centre of Excellence (CCDCE), part of the
North Atlantic Treaty Organization (NATO) The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental transnational military alliance of 32 member states—30 European and 2 North American. Established in the aftermath ...
, have conducted a yearly war game called Locked Shields since 2010 designed to test readiness and improve skills, strategy tactics and operational decision making of participating national organizations. Locked Shields 2019 saw 1200 participants from 30 countries compete in a
red team A red team is a group that simulates an adversary, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work fo ...
vs. blue team exercise. The war game involved a fictional country, Berylia, which was "experiencing a deteriorating security situation, where a number of hostile events coincide with coordinated cyber attacks against a major civilian internet service provider and maritime surveillance system. The attacks caused severe disruptions in the power generation and distribution, 4G communication systems, maritime surveillance, water purification plant and other critical infrastructure components". CCDCE describe the aim of the exercise was to "maintain the operation of various systems under intense pressure, the strategic part addresses the capability to understand the impact of decisions made at the strategic and policy level." Ultimately,
France France, officially the French Republic, is a country located primarily in Western Europe. Overseas France, Its overseas regions and territories include French Guiana in South America, Saint Pierre and Miquelon in the Atlantic Ocean#North Atlan ...
was the winner of Locked Shields 2019. The
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
conducts cyber war game scenarios with member states and foreign partner states to improve readiness, skills and observe how strategic and tactical decisions may affect the scenario. As well as war games which serve a broader purpose to explore options and improve skills, cyber war games are targeted at preparing for specific threats. In 2018 the Sunday Times reported the UK government was conducting cyber war games which could "blackout Moscow". These types of war games move beyond defensive preparedness, as previously described above and onto preparing offensive capabilities which can be used as deterrence, or for "war".


Cyber activities by nation

Approximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities.


Asia


China

According to Fritz, China has expanded its cyber capabilities and military technology by acquiring foreign military technology. Fritz states that the Chinese government uses "new space-based surveillance and intelligence gathering systems,
Anti-satellite weapon Anti-satellite weapons (ASAT) are space weapons designed to incapacitate or destroy satellites for Military strategy, strategic or Military tactics, tactical purposes. Although no ASAT system has been utilized in warfare, a few countries (China, ...
, anti-radar, infrared decoys, and false target generators" to assist in this quest, and that they support their " Informatisation" of their military through "increased education of soldiers in cyber warfare; improving the information network for military training, and has built more virtual laboratories, digital libraries and digital campuses." Through this informatisation, they hope to prepare their forces to engage in a different kind of warfare, against technically capable adversaries. ''
Foreign Policy Foreign policy, also known as external policy, is the set of strategies and actions a State (polity), state employs in its interactions with other states, unions, and international entities. It encompasses a wide range of objectives, includ ...
'' magazine put the size of China's "hacker army" at anywhere from 50,000 to 100,000 individuals. Diplomatic cables highlight US concerns that China is using access to Microsoft source code and 'harvesting the talents of its private sector' to boost its offensive and defensive capabilities. While China continues to be held responsible for a string of cyber-attacks on a number of public and private institutions in the United States, India, Russia, Canada, and France, the Chinese government denies any involvement in cyber-spying campaigns. The administration maintains the position that China is also victim to an increasing number of cyber-attacks. Most reports about China's cyber warfare capabilities have yet to be confirmed by the
Chinese government The government of the People's Republic of China is based on a system of people's congress within the parameters of a Unitary state, unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's ...
. In June 2015, the
United States Office of Personnel Management The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the United States federal civil service. The agency provides federal human resources policy, oversight, and support, an ...
(OPM) announced that it had been the target of a
data breach A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information". Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
targeting the records of as many as four million people. Later,
FBI Director The director of the Federal Bureau of Investigation is the head of the Federal Bureau of Investigation (FBI), a United States federal law enforcement agency, and is responsible for its day-to-day operations. The FBI director is appointed for a ...
James Comey James Brien Comey Jr. (; born December 14, 1960) is an American lawyer who was the seventh director of the Federal Bureau of Investigation (FBI) from 2013 until Dismissal of James Comey, his termination in May 2017. Comey was a registered Repub ...
put the number at 18 million. The ''Washington Post'' has reported that the attack originated in
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
, citing unnamed government officials.
Operation Shady RAT Operation Shady RAT is an ongoing series of cyber attacks starting in mid-2006 reported by Dmitri Alperovitch, Vice President of Threat Research at Internet security company McAfee in August 2011, who also led and named the Night Dragon Operation ...
is a series of
cyber attack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
s starting mid-2006, reported by Internet security company
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
in August 2011. China is widely believed to be the state actor behind these attacks which hit at least 72 organizations including governments and defense contractors. The 2018 cyberattack on the Marriott hotel chain that collected personal details of roughly 500 million guests is now known to be a part of a Chinese intelligence-gathering effort that also hacked health insurers and the security clearance files of millions more Americans, The hackers, are suspected of working on behalf of the Ministry of State Security (MSS), the country's Communist-controlled civilian spy agency. On 14 September 2020, a database showing personal details of about 2.4 million people around the world was leaked and published. A Chinese company, Zhenhua Data compiled the database. According to the information from "National Enterprise Credit Information Publicity System", which is run by
State Administration for Market Regulation The State Administration for Market Regulation (SAMR; ) is a ministerial-level agency directly under the State Council of the People's Republic of China responsible for market supervision and management. SAMR was established in 2018. It is China ...
in China, the shareholders of Zhenhua Data Information Technology Co., Ltd. are two natural persons and one general partnership enterprise whose partners are natural persons. Wang Xuefeng, who is the chief executive and the shareholder of Zhenhua Data, has publicly boasted that he supports "hybrid warfare" through manipulation of public opinion and "psychological warfare". In February 2024 The
Philippines The Philippines, officially the Republic of the Philippines, is an Archipelagic state, archipelagic country in Southeast Asia. Located in the western Pacific Ocean, it consists of List of islands of the Philippines, 7,641 islands, with a tot ...
announced that it had successfully fought off a
cyber attack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
which was traced to hackers in
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
. Several government websites were targeted including the National coast watch and personal website of the president of the
Philippines The Philippines, officially the Republic of the Philippines, is an Archipelagic state, archipelagic country in Southeast Asia. Located in the western Pacific Ocean, it consists of List of islands of the Philippines, 7,641 islands, with a tot ...
,
Bongbong Marcos Ferdinand "Bongbong" Romualdez Marcos Jr. (, , ; born September 13, 1957), commonly referred to by the initials BBM or PBBM, is a Filipino politician who has served as the 17th president of the Philippines since 2022. He is the second child ...
. In May 2024 The UK announced that it had taken a database offline that is used by its defense ministry after coming under a cyber attack attributed to the Chinese state.


India

The Department of Information Technology created the
Indian Computer Emergency Response Team The Indian Computer Emergency Response Team (CERT-In or ICERT) is an office within the Ministry of Electronics and Information Technology of the Government of India. It is the nodal agency to deal with cyber security incidents. It strengthens se ...
(CERT-In) in 2004 to thwart cyber attacks in India. That year, there were 23 reported cyber security breaches. In 2011, there were 13,301. That year, the government created a new subdivision, the
National Critical Information Infrastructure Protection Centre National Critical Information Infrastructure Protection Centre (NCIIPC) is an organisation of the Government of India created under Section 70A of the Information Technology Act, 2000 (amended 2008), through a gazette notification on 16 January ...
(NCIIPC) to thwart attacks against energy, transport, banking, telecom, defense, space and other sensitive areas. The executive director of the
Nuclear Power Corporation of India The Nuclear Power Corporation of India Limited (NPCIL) is an Indian public sector undertaking based in Mumbai, Maharashtra. It is wholly owned by the Government of India and is responsible for the generation of electricity from nuclear power. N ...
(NPCIL) stated in February 2013 that his company alone was forced to block up to ten targeted attacks a day. CERT-In was left to protect less critical sectors. A high-profile cyber attack on 12 July 2012 breached the email accounts of about 12,000 people, including those of officials from the Ministry of External Affairs,
Ministry of Home Affairs An interior ministry or ministry of the interior (also called ministry of home affairs or ministry of internal affairs) is a government department that is responsible for domestic policy, public security and law enforcement. In some states, the i ...
, Defense Research and Development Organizations (DRDO), and the
Indo-Tibetan Border Police The Indo-Tibetan Border Police (ITBP) is a Central Armed Police Forces, central armed police force in India under the Ministry of Home Affairs (India), Ministry of Home Affairs. It is responsible for guarding Border guard, India’s border with ...
(ITBP). A government-private sector plan being overseen by National Security Advisor (NSA)
Shivshankar Menon Shivshankar Menon (born 5 July 1949) is a retired Indian diplomat of Indian Foreign Service who served as National Security Advisor of India to the Prime Minister Manmohan Singh. He had previously served as the Foreign Secretary in the Minist ...
began in October 2012, and intends to boost up India's cyber security capabilities in the light of a group of experts findings that India faces a 470,000 shortfall of such experts despite the country's reputation of being an IT and software powerhouse. In February 2013, Information Technology Secretary J. Satyanarayana stated that the NCIIPC was finalizing policies related to national cyber security that would focus on domestic security solutions, reducing exposure through foreign technology. Other steps include the isolation of various security agencies to ensure that a synchronised attack could not succeed on all fronts and the planned appointment of a National Cyber Security Coordinator. As of that month, there had been no significant economic or physical damage to India related to cyber attacks. On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks. On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the
Central Bureau of Investigation The Central Bureau of Investigation (CBI) is the domestic crime investigating agency of India. It operates under the jurisdiction of the Ministry of Personnel, Public Grievances and Pensions. Originally set up to investigate bribery and gover ...
(CBI). The
National Informatics Center The National Informatics Centre (NIC) is an Indian government department under the Ministry of Electronics and Information Technology (MeitY). It provides infrastructure, IT Consultancy, IT Services including but not limited to architecture, ...
(NIC) has begun an inquiry. In July 2016, Cymmetria researchers discovered and revealed the cyber attack dubbed 'Patchwork', which compromised an estimated 2500 corporate and government agencies using code stolen from
GitHub GitHub () is a Proprietary software, proprietary developer platform that allows developers to create, store, manage, and share their code. It uses Git to provide distributed version control and GitHub itself provides access control, bug trackin ...
and the
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
. Examples of weapons used are an exploit for the Sandworm vulnerability (), a compiled AutoIt script, and UAC bypass code dubbed UACME. Targets are believed to be mainly military and political assignments around Southeast Asia and the South China Sea and the attackers are believed to be of Indian origin and gathering intelligence from influential parties. The
Defence Cyber Agency The Defence Cyber Agency (DCyA) is an integrated tri-services agency of the Indian Armed Forces. Headquartered in New Delhi, the agency is tasked with handling cyber security threats. The DCyA draws personnel from all three branches of the Arme ...
, which is the Indian Military agency responsible for Cyberwarfare, is expected to become operational by November 2019.


Philippines

The Chinese are being blamed after a cybersecurity company, F-Secure Labs, found a malware, NanHaiShu, which targeted the Philippines Department of Justice. It sent information in an infected machine to a server with a Chinese IP address. The malware which is considered particularly sophisticated in nature was introduced by phishing emails that were designed to look like they were coming from an authentic sources. The information sent is believed to be relating to the South China Sea legal case.


South Korea

In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and financial websites in
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia. It constitutes the southern half of the Korea, Korean Peninsula and borders North Korea along the Korean Demilitarized Zone, with the Yellow Sea to the west and t ...
and the United States. While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom. Security researcher Chris Kubecka presented evidence multiple
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
and
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
companies unwittingly helped attack South Korea due to a
W32.Dozer W3 or W-3 may refer to: * W3 (tram), a class of electric trams built by the Melbourne & Metropolitan Tramways Board * W3, a postcode district in the W postcode area * Apple W3, a wireless chip used in the Apple Watch Series 4. * PZL W-3 Sokół, a ...
infections, malware used in part of the attack. Some of the companies used in the attack were partially owned by several governments, further complicating
cyber attribution In the area of computer security, cyber attribution is an legal attribution, attribution of cybercrime, i.e., finding who perpetrated a cyberattack. Uncovering a perpetrator may give insights into various security issues, such as infiltration metho ...
. In July 2011, the South Korean company
SK Communications SK Communications (Hangul: SK커뮤니케이션즈 or ''에스케이커뮤니케이션즈'') is a South Korean technology company that owns and operates popular web portal Nate. It offers Internet access and telecommunications services for resi ...
was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted hacking effort. With ongoing tensions on the Korean Peninsula, South Korea's defense ministry stated that South Korea was going to improve cyber-defense strategies in hopes of preparing itself from possible cyber attacks. In March 2013, South Korea's major banks – Shinhan Bank, Woori Bank and NongHyup Bank – as well as many broadcasting stations – KBS, YTN and MBC – were hacked and more than 30,000 computers were affected; it is one of the biggest attacks South Korea has faced in years. Although it remains uncertain as to who was involved in this incident, there has been immediate assertions that North Korea is connected, as it threatened to attack South Korea's government institutions, major national banks and traditional newspapers numerous times – in reaction to the sanctions it received from nuclear testing and to the continuation of
Foal Eagle Foal Eagle () is a combined field training exercise (FTX) conducted annually by the Republic of Korea Armed Forces and the United States Armed Forces under the auspices of the Combined Forces Command. It is one of the largest military exercises ...
, South Korea's annual joint military exercise with the United States. North Korea's cyber warfare capabilities raise the alarm for South Korea, as North Korea is increasing its manpower through military academies specializing in hacking. Current figures state that South Korea only has 400 units of specialized personnel, while North Korea has more than 3,000 highly trained hackers; this portrays a huge gap in cyber warfare capabilities and sends a message to South Korea that it has to step up and strengthen its Cyber Warfare Command forces. Therefore, in order to be prepared from future attacks, South Korea and the United States will discuss further about deterrence plans at the Security Consultative Meeting (SCM). At SCM, they plan on developing strategies that focuses on accelerating the deployment of ballistic missiles as well as fostering its defense shield program, known as the Korean Air and Missile Defense.


North Korea


Africa


Egypt

In an extension of a bilateral dispute between
Ethiopia Ethiopia, officially the Federal Democratic Republic of Ethiopia, is a landlocked country located in the Horn of Africa region of East Africa. It shares borders with Eritrea to the north, Djibouti to the northeast, Somalia to the east, Ken ...
and
Egypt Egypt ( , ), officially the Arab Republic of Egypt, is a country spanning the Northeast Africa, northeast corner of Africa and Western Asia, southwest corner of Asia via the Sinai Peninsula. It is bordered by the Mediterranean Sea to northe ...
over the
Grand Ethiopian Renaissance Dam The Grand Ethiopian Renaissance Dam (GERD or TaIHiGe; , , ), formerly known as the Millennium Dam and sometimes referred to as the Hidase Dam (, ), is a gravity dam on the Blue Nile River in Ethiopia. The dam is in the Benishangul-Gumuz Region ...
, Ethiopian government websites have been hacked by the Egypt-based hackers in June 2020.


Europe


Cyprus

The New York Times published an exposé revealing an extensive three-year phishing campaign aimed against diplomats based in
Cyprus Cyprus (), officially the Republic of Cyprus, is an island country in the eastern Mediterranean Sea. Situated in West Asia, its cultural identity and geopolitical orientation are overwhelmingly Southeast European. Cyprus is the List of isl ...
. After accessing the state system the hackers had access to the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
's entire exchange database. By login into Coreu, hackers accessed communications linking all EU states, on both sensitive and not so sensitive matters. The event exposed poor protection of routine exchanges among European Union officials and a coordinated effort from a foreign entity to spy on another country. "After over a decade of experience countering Chinese cyberoperations and extensive technical analysis, there is no doubt this campaign is connected to the Chinese government", said Blake Darche, one of the
Area 1 Security Area 1 Security, Inc. was an American cybersecurity company based in Redwood City, California which was acquired by Cloudflare in April 2022. History Area 1 was incorporated in 2013 by Oren Falkowitz, Blake Darché, and Phil Syme, previously emp ...
experts – the company revealing the stolen documents. The Chinese Embassy in the US did not return calls for comment. In 2019, another coordinated effort took place that allowed hackers to gain access to government (gov.cy) emails. Cisco's Talos Security Department revealed that "Sea Turtle" hackers carried out a broad piracy campaign in the DNS countries, hitting 40 different organizations, including Cyprus.


Estonia

In April 2007, Estonia came under cyber attack in the wake of relocation of the
Bronze Soldier of Tallinn The Bronze Soldier (, ) is the informal name of a controversial Soviet World War II war memorial in Tallinn, Estonia, built at the site of several war graves, which were relocated to the nearby Tallinn Military Cemetery in 2007. It was originall ...
. The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia. In the attack, ministries, banks, and media were targeted. This attack on Estonia, a seemingly small Baltic state, was so effective because of how most of Estonian government services are run online. Estonia has implemented an e-government, where banking services, political elections, taxes, and other components of a modern society are now all done online.


France

In 2013, the French Minister of Defense, Mr
Jean-Yves Le Drian Jean-Yves Le Drian (; born 30 June 1947) is a French politician who served as Minister of Europe and Foreign Affairs in the governments of Prime Ministers Édouard Philippe and Jean Castex (2017–2022) and as Minister of Defence under Preside ...
, ordered the creation of a cyber army, representing its fourth national army corps (along with ground, naval and air forces) under the French Ministry of Defense, to protect French and European interests on its soil and abroad. A contract was made with French firm
EADS Airbus SE ( ; ; ; ) is a Pan-European aerospace corporation. The company's primary business is the design and manufacturing of commercial aircraft but it also has separate defence and space and helicopter divisions. Airbus has long been th ...
(
Airbus Airbus SE ( ; ; ; ) is a Pan-European aerospace corporation. The company's primary business is the design and manufacturing of commercial aircraft but it also has separate Airbus Defence and Space, defence and space and Airbus Helicopters, he ...
) to identify and secure its main elements susceptible to cyber threats. In 2016 France had planned 2600 "cyber-soldiers" and a 440 million euros investment for cybersecurity products for this new army corps. An additional 4400 reservists constitute the heart of this army from 2019.


Germany

In 2013, Germany revealed the existence of their 60-person Computer Network Operation unit. The German intelligence agency, BND, announced it was seeking to hire 130 "hackers" for a new " cyber defence station" unit. In March 2013, BND president Gerhard Schindler announced that his agency had observed up to five attacks a day on government authorities, thought mainly to originate in China. He confirmed the attackers had so far only accessed data and expressed concern that the stolen information could be used as the basis of future sabotage attacks against arms manufacturers, telecommunications companies and government and military agencies. Shortly after
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
leaked details of the U.S.
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
's cyber surveillance system, German Interior Minister
Hans-Peter Friedrich Hans-Peter Friedrich (born 10 March 1957) is a German politician of the Christian Social Union (CSU) who has been serving as a member of the German Bundestag from 1998 to 2025 . Under the leadership of Chancellor Angela Merkel, he served as ...
announced that the BND would be given an additional budget of 100 million Euros to increase their cyber surveillance capability from 5% of total internet traffic in Germany to 20% of total traffic, the maximum amount allowed by German law.


Netherlands

In the
Netherlands , Terminology of the Low Countries, informally Holland, is a country in Northwestern Europe, with Caribbean Netherlands, overseas territories in the Caribbean. It is the largest of the four constituent countries of the Kingdom of the Nether ...
, Cyber Defense is nationally coordinated by the (NCSC). The Dutch Ministry of Defense laid out a cyber strategy in 2011. The first focus is to improve the cyber defense handled by the Joint IT branch (JIVC). To improve intel operations, the intel community in the Netherlands (including the military intel organization, MIVD) has set up the Joint Sigint Cyber Unit (JSCU). The Ministry of Defense oversees an offensive cyber force, called Defensive Cyber Command (DCC).


Norway


Russia

It has been claimed that Russian security services organized a number of
denial of service attacks In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
as a part of their
cyber-warfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic w ...
against other countries, most notably the
2007 cyberattacks on Estonia Beginning on 27 April 2007, a series of cyberattacks targeted websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country's disagreement with Russia about the relocation of t ...
and the 2008 cyberattacks on Russia, South Ossetia, Georgia, and Azerbaijan. One identified young Russian hacker said that he was paid by Russian state security services to lead hacking attacks on
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
computers. He was studying
computer sciences Computer science is the study of computation, information, and automation. Computer science spans theoretical disciplines (such as algorithms, theory of computation, and information theory) to applied disciplines (including the design and ...
at the ''Department of the Defense of Information''. His tuition was paid for by the FSB. Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the
2008 South Ossetia War The August 2008 Russo-Georgian War, also known as the Russian invasion of Georgia,Occasionally, the war is also referred to by other names, such as the Five-Day War and August War. was a war waged against Georgia by the Russian Federation and the ...
. In October 2016,
Jeh Johnson Jeh Charles Johnson ( "Jay"; born September 11, 1957) is an American lawyer and former government official. He was United States Secretary of Homeland Security from 2013 to 2017. From 2009 to 2012, Johnson was the general counsel of the Departm ...
the
United States Secretary of Homeland Security The United States secretary of homeland security is the head of the United States Department of Homeland Security, the federal department tasked with ensuring public safety in the United States. The secretary is a member of the Cabinet of the ...
and
James Clapper James Robert Clapper Jr. (born March 14, 1941) is a retired lieutenant general in the United States Air Force and former Director of National Intelligence. Clapper has held several key positions within the United States Intelligence Community. ...
the U.S.
Director of National Intelligence The director of national intelligence (DNI) is a Cabinet of the United States#Current Cabinet and Cabinet-rank officials, cabinet-level Federal government of the United States, United States government intelligence and security official. The p ...
issued a joint statement accusing Russia of interfering with the 2016 United States presidential election. The New York Times reported the Obama administration formally accused Russia of stealing and disclosing
Democratic National Committee The Democratic National Committee (DNC) is the principal executive leadership board of the United States's Democratic Party (United States), Democratic Party. According to the party charter, it has "general responsibility for the affairs of the ...
emails. Under U.S. law (50 U.S.C.Title 50 – War and National Defense, Chapter 15 – National Security, Subchapter III Accountability for Intelligence Activities) there must be a formal ''Presidential finding'' prior to authorizing a covert attack. Then U.S. vice president
Joe Biden Joseph Robinette Biden Jr. (born November 20, 1942) is an American politician who was the 46th president of the United States from 2021 to 2025. A member of the Democratic Party (United States), Democratic Party, he served as the 47th vice p ...
said on the American news interview program ''
Meet The Press ''Meet the Press'' is a weekly American television Sunday morning talk show broadcast on NBC. It is the List of longest-running television shows by category, longest-running program on American television, though its format has changed since th ...
'' that the United States will respond. The New York Times noted that Biden's comment "seems to suggest that Mr. Obama is prepared to order – or has already ordered – some kind of covert action".


Sweden

In January 2017, Sweden's armed forces were subjected to a cyber-attack that caused them to shutdown a so-called Caxcis IT system used in
military exercises A military exercise, training exercise, maneuver (manoeuvre), or war game is the employment of military resources in training for military operations. Military exercises are conducted to explore the effects of warfare or test tactics and strat ...
.


Ukraine

According to
CrowdStrike CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides endpoint security, threat intelligence, and cyberattack response services. The company has been involved in investigations of seve ...
from 2014 to 2016, the Russian APT
Fancy Bear Fancy Bear is a Russian cyber espionage group. American cybersecurity firm CrowdStrike has stated with a medium level of confidence that it is associated with the Russian military intelligence agency GRU. The UK's Foreign and Commonwealth Offic ...
used Android malware to target the Ukrainian Army's Rocket Forces and Artillery. They distributed an infected version of an
Android Android most commonly refers to: *Android (robot), a humanoid robot or synthetic organism designed to imitate a human * Android (operating system), a mobile operating system primarily developed by Google * Android TV, a operating system developed ...
app whose original purpose was to control targeting data for the D-30 Howitzer artillery. The app, used by Ukrainian officers, was loaded with the X-Agent spyware and posted online on military forums. The attack was claimed by Crowd-Strike to be successful, with more than 80% of Ukrainian D-30 Howitzers destroyed, the highest percentage loss of any artillery pieces in the army (a percentage that had never been previously reported and would mean the loss of nearly the entire arsenal of the biggest artillery piece of the
Ukrainian Armed Forces The Armed Forces of Ukraine (AFU) are the Military, military forces of Ukraine. All military and security forces, including the Armed Forces, are under the command of the president of Ukraine and subject to oversight by a permanent Verkhovna Rad ...
). According to the
Ukrainian army The Ukrainian Ground Forces (SVZSU, ), also referred to as the Ukrainian army, is a land force, and one of the eight Military branch, branches of the Armed Forces of Ukraine. It was formed from Ukrainian units of the Soviet Army after Declaratio ...
this number is incorrect and that losses in artillery weapons "were way below those reported" and that these losses "have nothing to do with the stated cause". In 2014, the Russians were suspected to use a cyber weapon called "
Snake Snakes are elongated limbless reptiles of the suborder Serpentes (). Cladistically squamates, snakes are ectothermic, amniote vertebrates covered in overlapping scales much like other members of the group. Many species of snakes have s ...
", or "Ouroboros," to conduct a cyber attack on Ukraine during a period of political turmoil. The Snake tool kit began spreading into Ukrainian computer systems in 2010. It performed Computer Network Exploitation (CNE), as well as highly sophisticated Computer Network Attacks (CNA). On 23 December 2015 the Black-Energy malware was used in a cyberattack on Ukraine's power-grid that left more than 200,000 people temporarily without power. A mining company and a large railway operator were also victims of the attack. Ukraine saw a massive surge in cyber attacks during the
2022 Russian invasion of Ukraine On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...
. Several websites belonging to Ukrainian banks and government departments became inaccessible.


United Kingdom

MI6 The Secret Intelligence Service (SIS), commonly known as MI6 ( Military Intelligence, Section 6), is the foreign intelligence service of the United Kingdom, tasked mainly with the covert overseas collection and analysis of human intelligenc ...
reportedly infiltrated an Al Qaeda website and replaced the instructions for making a
pipe bomb A pipe bomb is an improvised explosive device (IED) that uses a tightly sealed section of pipe filled with an explosive material. The containment provided by the pipe means that simple low explosives can be used to produce a relatively larg ...
with the recipe for making
cupcakes A cupcake (AmE, CanE), fairy cake ( BrE), or bun (IrE) is a small cake designed to serve one person, which may be baked in a small thin paper or aluminum cup. As with larger cakes, frosting, icing and various other cake decorations such as f ...
. In October 2010, Iain Lobban, the director of the
Government Communications Headquarters Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primari ...
(GCHQ), said the UK faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened the UK's economic future, and some countries were already using cyber assaults to put pressure on other nations. On 12 November 2013, financial organizations in London conducted cyber war games dubbed "Waking Shark 2" to simulate massive internet-based attacks against bank and other financial organizations. The Waking Shark 2 cyber war games followed a similar exercise in
Wall Street Wall Street is a street in the Financial District, Manhattan, Financial District of Lower Manhattan in New York City. It runs eight city blocks between Broadway (Manhattan), Broadway in the west and South Street (Manhattan), South Str ...
.


Middle East


Iran

Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
has been both victim and perpetrator of several cyberwarfare operations. Iran is considered an emerging military power in the field. In September 2010,
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
was attacked by the
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
worm, thought to specifically target its Natanz nuclear enrichment facility. It was a 500-kilobyte computer worm that infected at least 14 industrial sites in Iran, including the Natanz uranium-enrichment plant. Although the official authors of Stuxnet haven't been officially identified, Stuxnet is believed to be developed and deployed by the United States and Israel. The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare. Iranian Cyber Police department, FATA, was dismissed one year after its creation in 2011 because of the arrest and death of Sattar Behesti, a blogger, in the custody of FATA. Since then, the main responsible institution for the cyberwarfare in Iran is the "Cyber Defense Command" operating under the Joint Staff of Iranian Armed Forces. The Iranian state sponsored group ''MuddyWater'' is active since at least 2017 and is responsible for many cyber attacks on various sectors.


Israel

In the 2006 war against
Hezbollah Hezbollah ( ; , , ) is a Lebanese Shia Islamist political party and paramilitary group. Hezbollah's paramilitary wing is the Jihad Council, and its political wing is the Loyalty to the Resistance Bloc party in the Lebanese Parliament. I ...
, Israel alleges that cyber-warfare was part of the conflict, where the
Israel Defense Forces The Israel Defense Forces (IDF; , ), alternatively referred to by the Hebrew-language acronym (), is the national military of the State of Israel. It consists of three service branches: the Israeli Ground Forces, the Israeli Air Force, and ...
(IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units.
Richard A. Clarke Richard Alan Clarke (born October 27, 1950) is an American national security expert, novelist, and former government official. He served as the Counterterrorism Czar for the National Coordinator for Security, Infrastructure Protection, and C ...
adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades." In September 2007, Israel carried out an airstrike on a suspected nuclear reactor in Syria dubbed
Operation Orchard Operation Outside the Box, also known as Operation Orchard, was an Israeli airstrike on a suspected nuclear reactor, referred to as the Al Kibar site (also referred to in IAEA documents as Dair Alzour), in the Deir ez-Zor region of Syria, w ...
. U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria. Following US President
Donald Trump Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who is the 47th president of the United States. A member of the Republican Party (United States), Republican Party, he served as the 45 ...
's decision to pull out of the
Iran nuclear deal The Joint Comprehensive Plan of Action (JCPOA; (, BARJAM)), also known as the Iran nuclear deal or Iran deal, is an agreement to limit the Iranian nuclear program in return for sanctions relief and other provisions. The agreement was finalize ...
in May 2018, cyber warfare units in the United States and Israel monitoring internet traffic out of Iran noted a surge in retaliatory cyber attacks from Iran. Security firms warned that Iranian hackers were sending emails containing malware to diplomats who work in the foreign affairs offices of US allies and employees at telecommunications companies, trying to infiltrate their computer systems.


Saudi Arabia

On 15 August 2012 at 11:08 am local time, the
Shamoon Shamoon (), also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit architecture of Windows NT, NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature ...
virus began destroying over 35,000 computer systems, rendering them inoperable. The virus used to target the
Saudi Saudi or Saudi Arabian may refer to: * Saudi Arabia * Saudis, people from Saudi Arabia * Saudi culture, the culture of Saudi Arabia * House of Saud, the ruling family of Saudi Arabia See also *Saud (disambiguation) The House of Saud The H ...
government by causing destruction to the state owned national oil company
Saudi Aramco Saudi Aramco ( ') or Aramco (formerly Arabian-American Oil Company), officially the Saudi Arabian Oil Company, is a majority state-owned petroleum and natural gas company that is the national oil company of Saudi Arabia. , it is the fourth- l ...
. The attackers posted a pastie on PasteBin.com hours prior to the wiper logic bomb occurring, citing oppression and the Al-Saud regime as a reason behind the attack. The attack was well staged according to Chris Kubecka, a former security advisor to Saudi Aramco after the attack and group leader of security for Aramco Overseas. It was an unnamed Saudi Aramco employee on the Information Technology team which opened a malicious phishing email, allowing initial entry into the computer network around mid-2012.
archive
Kubecka also detailed in her Black Hat USA talk Saudi Aramco placed the majority of their security budget on the ICS control network, leaving the business network at risk for a major incident. The virus has been noted to have behavior differing from other malware attacks, due to the destructive nature and the cost of the attack and recovery. US Defense Secretary
Leon Panetta Leon Edward Panetta (born June 28, 1938) is an American retired politician and government official who has served under several Democratic administrations as secretary of defense (2011–2013), director of the CIA (2009–2011), White House chi ...
called the attack a "Cyber Pearl Harbor". Shamoon can spread from an infected machine to other computers on the network. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. Finally the virus overwrites the
master boot record A master boot record (MBR) is a type of boot sector in the first block of disk partitioning, partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept ...
of the infected computer, making it unusable. The virus has been used for
cyber warfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
against the national oil companies Saudi Aramco and Qatar's
RasGas RasGas Company Limited was a liquefied natural gas (LNG) producing company in Qatar. It was the second-biggest LNG producer in Qatar after QatarEnergy LNG. RasGas operated seven LNG trains located in Ras Laffan Industrial City. It was merged wi ...
. Saudi Aramco announced the attack on their Facebook page and went offline again until a company statement was issued on 25 August 2012. The statement falsely reported normal business was resumed on 25 August 2012. However a Middle Eastern journalist leaked photographs taken on 1 September 2012 showing kilometers of petrol trucks unable to be loaded due to backed business systems still inoperable. On 29 August 2012 the same attackers behind Shamoon posted another pastie on PasteBin.com, taunting Saudi Aramco with proof they still retained access to the company network. The post contained the username and password on security and network equipment and the new password for the CEO Khalid Al- Falih The attackers also referenced a portion of the Shamoon malware as further proof in the pastie. According to Kubecka, in order to restore operations. Saudi Aramco used its large private fleet of aircraft and available funds to purchase much of the world's hard drives, driving the price up. New hard drives were required as quickly as possible so oil prices were not affected by speculation. By 1 September 2012 gasoline resources were dwindling for the public of Saudi Arabia 17 days after the 15 August attack.
RasGas RasGas Company Limited was a liquefied natural gas (LNG) producing company in Qatar. It was the second-biggest LNG producer in Qatar after QatarEnergy LNG. RasGas operated seven LNG trains located in Ras Laffan Industrial City. It was merged wi ...
was also affected by a different variant, crippling them in a similar manner.


Qatar

In March 2018 American Republican fundraiser Elliott Broidy filed a lawsuit against Qatar, alleging that Qatar's government stole and leaked his emails in order to discredit him because he was viewed "as an impediment to their plan to improve the country's standing in Washington." In May 2018, the lawsuit named Mohammed bin Hamad bin Khalifa Al Thani, brother of the Emir of Qatar, and his associate Ahmed Al-Rumaihi, as allegedly orchestrating Qatar's cyber warfare campaign against Broidy. Further litigation revealed that the same cybercriminals who targeted Broidy had targeted as many as 1,200 other individuals, some of whom are also "well-known enemies of Qatar" such as senior officials of the U.A.E., Egypt, Saudi Arabia, and Bahrain. While these hackers almost always obscured their location, some of their activity was traced to a telecommunication network in Qatar.


United Arab Emirates

The
United Arab Emirates The United Arab Emirates (UAE), or simply the Emirates, is a country in West Asia, in the Middle East, at the eastern end of the Arabian Peninsula. It is a Federal monarchy, federal elective monarchy made up of Emirates of the United Arab E ...
has launched several cyber-attacks in the past targeting dissidents.
Ahmed Mansoor Ahmed Mansoor Al Shehhi () is an Emirati blogger, human rights and reform activist arrested in 2011 for defamation and insults to the heads of state and tried in the UAE Five trial. He was pardoned by UAE's president Sheikh Khalifa bin Zayed Al ...
, an Emirati citizen, was jailed for sharing his thoughts on
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
. He was given the code name Egret under the state-led covert project called Raven, which spied on top political opponents, dissidents, and journalists.
Project Raven DarkMatter Group is a computer security company founded in the United Arab Emirates (UAE) in 2014 or 2015. The company has described itself as a purely defensive company; however, in 2016, it became a contractor for Project Raven, helping the ...
deployed a secret hacking tool called Karma, to spy without requiring the target to engage with any web links. In September 2021, three of the former American intelligence officers, Marc Baier, Ryan Adams, and Daniel Gericke, admitted to assisting the UAE in hacking crimes by providing them with advanced technology and violating US laws. Under a three-year
deferred prosecution agreement A deferred prosecution agreement (DPA), which is very similar to a non-prosecution agreement (NPA), is a voluntary alternative to adjudication in which a prosecutor agrees to grant amnesty in exchange for the defendant agreeing to fulfill certain ...
with the Justice Department, the three defendants also agreed to pay nearly $1.7 million in fines to evade prison sentences. The court documents revealed that the Emirates hacked into the computers and mobile phones of dissidents, activists, and journalists. They also attempted to break into the systems of the US and rest of the world.


North America


United States

Cyberwarfare in the United States is a part of the American
military strategy Military strategy is a set of ideas implemented by military organizations to pursue desired Strategic goal (military), strategic goals. Derived from the Greek language, Greek word ''strategos'', the term strategy, when first used during the 18th ...
of
proactive cyber defence Proactive cyber defense means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or d ...
and the use of cyberwarfare as a platform for attack. The new United States military strategy makes explicit that a cyberattack is ''
casus belli A (; ) is an act or an event that either provokes or is used to justify a war. A ''casus belli'' involves direct offenses or threats against the nation declaring the war, whereas a ' involves offenses or threats against its ally—usually one bou ...
'' just as a traditional act of war. U.S. government security expert
Richard A. Clarke Richard Alan Clarke (born October 27, 1950) is an American national security expert, novelist, and former government official. He served as the Counterterrorism Czar for the National Coordinator for Security, Infrastructure Protection, and C ...
, in his book ''Cyber War'' (May 2010), had defined "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption." ''The Economist'' describes
cyberspace Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
as "the fifth domain of warfare,""Cyberwar: War in the Fifth Domain"
''Economist'', 1 July 2010
and
William J. Lynn William James Lynn III (born January 1, 1954) is a former United States United States Deputy Secretary of Defense, Deputy Secretary of Defense. Before that he was Under Secretary of Defense (Comptroller) and a lobbyist for Raytheon. Life and ca ...
, U.S. Deputy
Secretary of Defense A ministry of defence or defense (see spelling differences), also known as a department of defence or defense, is the part of a government responsible for matters of defence and military forces, found in states where the government is divided ...
, states that "as a doctrinal matter,
the Pentagon The Pentagon is the headquarters building of the United States Department of Defense, in Arlington County, Virginia, across the Potomac River from Washington, D.C. The building was constructed on an accelerated schedule during World War II. As ...
has formally recognized cyberspace as a new domain in warfare . . .
hich Ij () is a village in Golabar Rural District of the Central District in Ijrud County, Zanjan province, Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq ...
has become just as critical to military operations as land, sea, air, and space."Lynn, William J. III
"Defending a New Domain: The Pentagon's Cyberstrategy"
''Foreign Affairs'', Sept/Oct. 2010, pp. 97–108
When Russia was still a part of the
Soviet Union The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
in 1982, a portion of a Trans-Siberia pipeline within its territory exploded, allegedly due to a
Trojan Horse In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
computer malware implanted in the pirated Canadian software by the
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
. The malware caused the SCADA system running the pipeline to malfunction. The "Farewell Dossier" provided information on this attack, and wrote that compromised computer chips would become a part of Soviet military equipment, flawed turbines would be placed in the gas pipeline, and defective plans would disrupt the output of chemical plants and a tractor factory. This caused the "most monumental nonnuclear explosion and fire ever seen from space." However, the Soviet Union did not blame the United States for the attack. In 2009, president Barack Obama declared America's digital infrastructure to be a "strategic national asset," and in May 2010 the Pentagon set up its new U.S. Cyber Command (
USCYBERCOM United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
), headed by General Keith B. Alexander, director of the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), to defend American military networks and attack other countries' systems. The EU has set up ENISA (European Union Agency for Network and Information Security) which is headed by Prof. Udo Helmbrecht and there are now further plans to significantly expand ENISA's capabilities. The United Kingdom has also set up a cyber-security and "operations centre" based in
Government Communications Headquarters Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primari ...
(GCHQ), the British equivalent of the NSA. In the U.S. however, Cyber Command is only set up to protect the military, whereas the government and corporate infrastructures are primarily the responsibility respectively of the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
and private companies. On 19 June 2010, United States Senator
Joe Lieberman Joseph Isadore Lieberman (; February 24, 1942 – March 27, 2024) was an American politician and lawyer who served as a United States senator from Connecticut from 1989 to 2013. Originally a member of the Democratic Party (United States), Dem ...
(I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010", which he co-wrote with Senator
Susan Collins Susan Margaret Collins (born December 7, 1952) is an American politician serving as the senior United States senator from Maine. A member of the Republican Party, she has held her seat since 1997 and is Maine's longest-serving member of ...
(R-ME) and Senator
Thomas Carper Thomas Richard Carper (born January 23, 1947) is an American politician and former military officer who served from 2001 to 2025 as a United States senator from Delaware. A member of the Democratic Party, Carper served from 1983 to 1993 in the ...
(D-DE). If signed into law, this controversial bill, which the American media dubbed the "'' Kill switch bill''", would grant the president emergency powers over parts of the Internet. However, all three co-authors of the bill issued a statement that instead, the bill " arrowedexisting broad presidential authority to take over telecommunications networks".Senators Say Cybersecurity Bill Has No 'Kill Switch'
, ''Information Week'', 24 June 2010. Retrieved 25 June 2010.
In August 2010, the U.S. for the first time warned publicly about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies. The Pentagon also pointed to an alleged China-based computer spying network dubbed
GhostNet GhostNet () is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an advanced persistent threat, or a network actor that spi ...
which was revealed in a 2009 research report. On 6 October 2011, it was announced that
Creech AFB Creech Air Force Base is a United States Air Force (USAF) command and control facility in Clark County, Nevada used "to engage in daily Overseas Contingency Operations …of remotely piloted aircraft systems which fly missions across the globe." ...
's drone and Predator fleet's command and control data stream had been keylogged, resisting all attempts to reverse the exploit, for the past two weeks. The Air Force issued a statement that the virus had "posed no threat to our operational mission". On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center. In June 2012 ''the New York Times'' reported that president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities. In August 2012, USA Today reported that the US conducted cyberattacks for tactical advantage in Afghanistan. According to a 2013 ''
Foreign Policy Foreign policy, also known as external policy, is the set of strategies and actions a State (polity), state employs in its interactions with other states, unions, and international entities. It encompasses a wide range of objectives, includ ...
'' magazine article, NSA's
Tailored Access Operations The Office of Tailored Access Operations (TAO), structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as ...
(TAO) unit "has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China." In 2014, Barack Obama ordered an intensification of cyberwarfare against
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and borders China and Russia to the north at the Yalu River, Yalu (Amnok) an ...
's missile program for sabotaging test launches in their opening seconds. On 24 November 2014,
Sony Pictures Entertainment hack On November 24, 2014, the hacker group " Guardians of Peace" leaked confidential data from the film studio Sony Pictures Entertainment (SPE). The data included employee emails, personal and family information, executive salaries, copies of th ...
was a release of confidential data belonging to Sony Pictures Entertainment (SPE). In 2016 President Barack Obama authorized the planting of cyber weapons in Russian infrastructure in the final weeks of his presidency in response to Moscow's interference in the 2016 presidential election. On 29 December 2016 United States imposed the most extensive sanctions against Russia since the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
, expelling 35 Russian diplomats from the United States. Economic sanctions are the most frequently used the foreign policy instruments by the United States today Thus, it is not surprising to see that economic sanctions are also used as counter policies against cyberattacks. According to Onder (2021), economic sanctions are also information gathering mechanisms for the sanctioning states about the capabilities of the sanctioned states. In March 2017, WikiLeaks published more than 8,000 documents on the
CIA The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
. The confidential documents, codenamed
Vault 7 Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dati ...
and dated from 2013 to 2016, include details on CIA's software capabilities, such as the ability to compromise
cars A car, or an automobile, is a motor vehicle with wheels. Most definitions of cars state that they run primarily on roads, seat one to eight people, have four wheels, and mainly transport people rather than cargo. There are around one billio ...
,
smart TV A smart TV, also known as a connected TV (CTV or, rarely, CoTV), is a traditional television set with integrated Internet and interactive Web 2.0 features that allow users to stream music and videos, browse the internet, and view photos. Smart T ...
s,
web browser A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
s (including
Google Chrome Google Chrome is a web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS, iOS, iPadOS, an ...
,
Microsoft Edge Microsoft Edge is a Proprietary Software, proprietary cross-platform software, cross-platform web browser created by Microsoft and based on the Chromium (web browser), Chromium open-source project, superseding Edge Legacy. In Windows 11, Edge ...
,
Mozilla Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curren ...
, and
Opera Software ASA Otello Corporation ASA (formerly Opera Software ASA) is a Norway, Norwegian internet company which develops advertising and mobile software for operators, publishers and advertisers. It operates through its subsidiaries which include AdColony (fo ...
), and the operating systems of most
smartphone A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s (including
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
's
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
and
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's
Android Android most commonly refers to: *Android (robot), a humanoid robot or synthetic organism designed to imitate a human * Android (operating system), a mobile operating system primarily developed by Google * Android TV, a operating system developed ...
), as well as other
operating system An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
s such as
Microsoft Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
,
macOS macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
, and
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
. In June 2019, the ''New York Times'' reported that American hackers from the
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
planted malware potentially capable of disrupting the Russian electrical grid. The United States topped the world in terms of cyberwarfare intent and capability, according to Harvard University's Belfer Center Cyber 2022 Power Index, above China, Russia, the United Kingdom and Australia. In June 2023, the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
and
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
were accused by the Russian
Federal Security Service The Federal Security Service of the Russian Federation СБ, ФСБ России (FSB) is the principal security agency of Russia and the main successor agency to the Soviet Union's KGB; its immediate predecessor was the Federal Counterin ...
(FSB) of compromising thousands of
iPhone The iPhone is a line of smartphones developed and marketed by Apple that run iOS, the company's own mobile operating system. The first-generation iPhone was announced by then–Apple CEO and co-founder Steve Jobs on January 9, 2007, at ...
s, including those of diplomats from China, Israel, NATO members, and Syria.
Kaspersky Lab Kaspersky Lab (; ) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky a ...
said many of its senior staff and managers were also hit by the ongoing attack, which it first suspected in early 2023. The oldest traces of infiltration date back to 2019. Kaspersky Lab said it had not shared the findings with Russian authorities until the FSB announcement.


Cyber mercenary

A cyber
mercenary A mercenary is a private individual who joins an armed conflict for personal profit, is otherwise an outsider to the conflict, and is not a member of any other official military. Mercenaries fight for money or other forms of payment rather t ...
is a
non-state actor A non-state actor (NSA) is an individual or organization that has significant political influence but is not allied to any particular country or state. The interests, structure, and influence of NSAs vary widely. For example, among NSAs are non-pr ...
that carries out cyber attacks for
Nation state A nation state, or nation-state, is a political entity in which the State (polity), state (a centralized political organization ruling over a population within a territory) and the nation (a community based on a common identity) are (broadly ...
s for hire. State actors can use the cyber mercenaries as a front to try and distance themselves from the attack with
plausible deniability Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge or responsibility for actions committed by or on behalf of members of their organizational hierarchy. They may ...
.


Cyberpeace

The rise of cyber as a warfighting domain has led to efforts to determine how cyberspace can be used to foster peace. For example, the German civil rights panel FIfF runs a campaign for cyberpeace − for the control of cyberweapons and surveillance technology and against the militarization of cyberspace and the development and stockpiling of offensive exploits and malware. Measures for cyberpeace include policymakers developing new rules and norms for warfare, individuals and organizations building new tools and secure infrastructures, promoting
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
, the establishment of cyber security centers, auditing of critical infrastructure cybersecurity, obligations to disclose vulnerabilities, disarmament, defensive security strategies, decentralization, education and widely applying relevant tools and infrastructures, encryption and other cyberdefenses. The topics of cyber peacekeeping and cyber peacemaking have also been studied by researchers, as a way to restore and strengthen peace in the aftermath of both cyber and traditional warfare.


Cyber counterintelligence

Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. * On 7 April 2009,
The Pentagon The Pentagon is the headquarters building of the United States Department of Defense, in Arlington County, Virginia, across the Potomac River from Washington, D.C. The building was constructed on an accelerated schedule during World War II. As ...
announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems. * On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time. * On 9 February 2009, the
White House The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue Northwest (Washington, D.C.), NW in Washington, D.C., it has served as the residence of every U.S. president ...
announced that it will conduct a review of the country's cyber security to ensure that the
Federal government of the United States The Federal Government of the United States of America (U.S. federal government or U.S. government) is the Federation#Federal governments, national government of the United States. The U.S. federal government is composed of three distinct ...
cyber security initiatives are appropriately integrated, resourced and coordinated with the
United States Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
and the private sector. * In the wake of the 2007 cyberwar waged against Estonia, NATO established the
Cooperative Cyber Defence Centre of Excellence NATO CCD COE, officially the NATO Cooperative Cyber Defence Centre of Excellence ( or ''NATO küberkaitsekoostöö keskus''), is one of NATO Centres of Excellence, located in Tallinn, Estonia. The centre was established on 14 May 2008, it recei ...
(CCD CoE) in
Tallinn Tallinn is the capital city, capital and List of cities in Estonia, most populous city of Estonia. Situated on a Tallinn Bay, bay in north Estonia, on the shore of the Gulf of Finland of the Baltic Sea, it has a population of (as of 2025) and ...
, Estonia, in order to enhance the organization's cyber defence capability. The center was formally established on 14 May 2008, and it received full accreditation by NATO and attained the status of International Military Organization on 28 October 2008. Since
Estonia Estonia, officially the Republic of Estonia, is a country in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the Baltic Sea across from Sweden, to the south by Latvia, and to the east by Ru ...
has led international efforts to fight cybercrime, the United States
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
says it will permanently base a computer crime expert in Estonia in 2009 to help fight international threats against computer systems. * In 2015, the Department of Defense released an updated cyber strategy memorandum detailing the present and future tactics deployed in the service of defense against cyberwarfare. In this memorandum, three cybermissions are laid out. The first cybermission seeks to arm and maintain existing capabilities in the area of cyberspace, the second cybermission focuses on prevention of cyberwarfare, and the third cybermission includes strategies for retaliation and preemption (as distinguished from prevention).Lisa Lucile Owens, Justice and Warfare in Cyberspace, The Boston Review (2015), available a

/ref> One of the hardest issues in cyber counterintelligence is the problem of
cyber attribution In the area of computer security, cyber attribution is an legal attribution, attribution of cybercrime, i.e., finding who perpetrated a cyberattack. Uncovering a perpetrator may give insights into various security issues, such as infiltration metho ...
. Unlike conventional warfare, figuring out who is behind an attack can be very difficult.


Doubts about existence

In October 2011 the ''
Journal of Strategic Studies The ''Journal of Strategic Studies'' is a peer-reviewed academic journal covering military and diplomatic strategic studies. It was established in 1978 by Frank Cass & Co. with John Gooch (University of Leeds) as founding editor-in-chief. The cu ...
'', a leading journal in that field, published an article by
Thomas Rid Thomas Rid (born 1975 in Aach, Baden-Württemberg, Germany) is a political scientist best known for his work on the history and risks of information technology in conflict. He is Professor of Strategic Studies at the Paul H. Nitze School of Advanc ...
, "Cyber War Will Not Take Place" which argued that all politically motivated cyber attacks are merely sophisticated versions of sabotage, espionage, or subversion – and that it is unlikely that cyber war will occur in the future.


Legal perspective

NIST, a cybersecurity framework, was published in 2014 in the US. The Tallinn Manual, published in 2013, is an academic, non-binding study on how international law, in particular the
jus ad bellum ' ( or ), literally "right to war" in Latin, refers to "the conditions under which States may resort to war or to the use of armed force in general". Jus ad bellum is one pillar of just war theory. Just war theory states that war should only be ...
and
international humanitarian law International humanitarian law (IHL), also referred to as the laws of armed conflict or the laws of war, is the law that regulates the conduct of war (''wikt:jus in bello, jus in bello''). It is a branch of international law that seeks to limit ...
, apply to cyber conflicts and
cyber warfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
. It was written at the invitation of the
Tallinn Tallinn is the capital city, capital and List of cities in Estonia, most populous city of Estonia. Situated on a Tallinn Bay, bay in north Estonia, on the shore of the Gulf of Finland of the Baltic Sea, it has a population of (as of 2025) and ...
-based NATO Cooperative Cyber Defence Centre of Excellence by an international group of approximately twenty experts between 2009 and 2012. The
Shanghai Cooperation Organisation The Shanghai Cooperation Organisation (SCO) is a Eurasian politics, political, economy, economic, international security and Defence (military), defence organization of ten member states. It was established in 2001 by the China, People's Republic ...
(members of which include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In September 2011, these countries proposed to the UN Secretary General a document called "International code of conduct for
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
". In contrast, the United approach focuses on physical and economic damage and injury, putting political concerns under
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements. However, American General Keith B. Alexander did endorse talks with Russia over a proposal to limit military attacks in cyberspace. In June 2013,
Barack Obama Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
and
Vladimir Putin Vladimir Vladimirovich Putin (born 7 October 1952) is a Russian politician and former intelligence officer who has served as President of Russia since 2012, having previously served from 2000 to 2008. Putin also served as Prime Minister of Ru ...
agreed to install a secure ''Cyberwar-Hotline'' providing "a direct secure voice communications line between the US cybersecurity coordinator and the Russian deputy secretary of the security council, should there be a need to directly manage a crisis situation arising from an ICT security incident" (White House quote).Sean Gallagher
''US, Russia to install "cyber-hotline" to prevent accidental cyberwar''
Arstechnica, 18 June 2013
A Ukrainian international law scholar, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against the political, economic, technological and information sovereignty and independence of another state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind". On the February 2017
RSA Conference The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991 as a small cryptography conference. RSA conferences take place in the United States, Europe, Asia ...
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
president Brad Smith suggested global rules – a "Digital Geneva Convention" – for cyber attacks that "ban the nation-state hacking of all the civilian aspects of our economic and political infrastructures". He also stated that an independent organization could investigate and publicly disclose evidence that attributes nation-state attacks to specific countries. Furthermore, he said that the technology sector should collectively and neutrally work together to protect Internet users and pledge to remain neutral in conflict and not aid governments in offensive activity and to adopt a coordinated disclosure process for software and hardware vulnerabilities. A fact-binding body has also been proposed to regulate cyber operations.


In popular culture


In films

* ''
Independence Day An independence day is an annual event memorialization, commemorating the anniversary of a nation's independence or Sovereign state, statehood, usually after ceasing to be a group or part of another nation or state, or after the end of a milit ...
'' (1996) * '' Terminator 3: Rise of the Machines'' (2003) * ''
Live Free or Die Hard ''Live Free or Die Hard'' (released as ''Die Hard 4.0'' outside North America) is a 2007 American action thriller film directed by Len Wiseman, the fourth installment in the Die Hard (franchise), ''Die Hard'' film series. It is based on the 199 ...
'' (2007) * ''
Terminator Genisys ''Terminator Genisys'' is a 2015 American cyberpunk action film that is the fifth installment in the Terminator (franchise), ''Terminator'' franchise. It is a Reboot (fiction), reboot of the franchise, taking the premise of the The Terminator, ...
'' (2015) *
Snowden Snowden may refer to: People * Snowden (surname), a given name and a family name * Edward Snowden, former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013 Fictional charac ...
(2016) * '' Terminator: Dark Fate'' (2019) ; Documentaries * ''Hacking the Infrastructure: Cyber Warfare'' (2016) by Viceland * ''Cyber War Threat'' (2015) * ''Darknet, Hacker, Cyberwar'' (2017) * ''
Zero Days ''Zero Days'' is a 2016 American documentary film directed by Alex Gibney. It was selected to compete for the Golden Bear at the 66th Berlin International Film Festival. Synopsis Although the entire subject is still shrouded in secrecy, the f ...
'' (2016) * ''The Perfect Weapon'' (2020)


In television

* " Cancelled", an episode of the animated sitcom ''
South Park ''South Park'' is an American animated sitcom created by Trey Parker and Matt Stone, and developed by Brian Graden for Comedy Central. The series revolves around four boysStan Marsh, Kyle Broflovski, Eric Cartman, and Kenny McCormickand the ...
'' * Series 2 of ''
COBRA COBRA or Cobra, often stylized as CoBrA, was a European avant-garde art group active from 1948 to 1951. The name was coined in 1948 by Christian Dotremont from the initials of the members' home countries' capital cities: Copenhagen (Co), Brussels ...
'', a British thriller series, revolves around a sustained campaign of cyberwar against the United Kingdom and the British government's response to it.


See also

*
Automated teller machine An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, funds transfers, balance inquiries or account ...
*
Computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
*
Computer security organizations A computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic sets of operations known as ''programs'', wh ...
*
Cyberattack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
*
Cybercrime Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
*
Cyber spying Cyber espionage, cyber spying, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers th ...
*
Cyber-arms industry The cyber-arms industry are the markets and associated events surrounding the sale of software exploits, zero-days, cyberweaponry, surveillance technologies, and related tools for perpetrating cyberattacks. The term may extend to both grey and ...
*
Cyberterrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside th ...
*
Cyberweapon Cyberweapons are commonly defined as malware agents employed for military, paramilitary, or intelligence objectives as part of a cyberattack. This includes computer viruses, trojans, spyware, and worms that can introduce malicious code into ex ...
*
Duqu Duqu is a collection of computer malware discovered on 1 September 2011, thought by Kaspersky Labs to be related to the Stuxnet worm and to have been created by Unit 8200. The Laboratory of Cryptography and System Security ( CrySyS Lab) of the ...
* Fifth Dimension Operations *
IT risk It or IT may refer to: * It (pronoun), in English * Information technology Arts and media Film and television * ''It'' (1927 film), a film starring Clara Bow * '' It! The Terror from Beyond Space'', a 1958 science fiction film * ''It!'' (1967 ...
*
iWar iWar is the term used by NATO to describe a form of Internet-based warfare. iWar comparisons iWar is distinct in that information warfare pertains to issues of intelligence, whereas cyber-warfare and cyber-terrorism pertain to issues oextelligen ...
*
List of cyber attack threat trends A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
*
List of cyber warfare forces Many countries around the world maintain military units that are specifically trained to operate in a cyberwarfare environment. In several cases these units act also as the national computer emergency response team for civilian cybersecurity thre ...
*
List of cyberattacks A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usuall ...
*
Military-digital complex The military-digital complex (MDC) is the militarization of cyber operations by governments and corporations, often through monetary relationships between computer programmers in private companies and the military to combat the threat of cyber ...
*
Penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
*
Proactive cyber defence Proactive cyber defense means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or d ...
*
Signals intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
*
Silent Horizon Silent Horizon is a United States war exercise that simulates cyberwarfare. It is run by the Central Intelligence Agency, an independent civilian intelligence agency of the United States government. The war exercise was first held in 2005, and the ...
*
United States Cyber Command United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
** Air Force Cyber Command ** Fleet Cyber Command **
Marine Corps Cyberspace Command The U.S. Marine Corps Forces Cyberspace Command (abbreviated as MARFORCYBER) is a functional formation of the United States Marine Corps to protect critical infrastructure from cyberattack. Marine Corps Forces Cyberspace Command is the Marine Corp ...
**
United States Army Cyber Command The U.S. Army Cyber Command (ARCYBER) conducts information dominance and cyberspace operations as the Army service component command of United States Cyber Command.The official regulation, General Order (DA GO 2016-11) was signed by the Secretar ...
* Virtual war *
Budapest Convention on Cybercrime The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime (cybercrime) harmonizing national laws, improving in ...
*
Vulkan files leak The Vulkan files are a leaked set of emails, and other documents, implicating the Russian company NTC Vulkan () in acts of cybercrime, political interference in foreign affairs (such as in the 2016 United States presidential election) through soc ...
* Hacking *
DDoS In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
*
Spyware Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
*
Firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...


References


Further reading

* Andress, Jason. Winterfeld, Steve. (2011). ''Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners''. Syngress. * Bodmer, Kilger, Carpenter, & Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. , "" * Brenner, S. (2009). ''Cyber Threats: The Emerging Fault Lines of the Nation State''. Oxford University Press. * Carr, Jeffrey. (2010). ''Inside Cyber Warfare: Mapping the Cyber Underworld''. O'Reilly. * Conti, Gregory. Raymond, David. (2017). ''On Cyber: Towards an Operational Art for Cyber Conflict''. Kopidion Press. * * * Fritsch, Lothar & Fischer-Hübner, Simone (2019)
Implications of Privacy & Security Research for the Upcoming Battlefield of Things
Journal of Information Warfare, 17(4), 72–87. * Gaycken, Sandro. (2012). ''Cyberwar – Das Wettrüsten hat längst begonnen''. Goldmann/Randomhouse. * Geers, Kenneth. (2011). ''Strategic Cyber Security''. NATO Cyber Centre
''Strategic Cyber Security''
, 169 pages * Halpern, Sue, "The Drums of Cyberwar" (review of
Andy Greenberg Andy Greenberg is a technology journalist serving as a senior writer at ''Wired'' magazine. He previously worked as a staff writer at ''Forbes'' magazine and as a contributor for Forbes.com. He has published the books '' This Machine Kills Sec ...
, ''Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers'', Doubleday, 2019, 348 pp.), ''
The New York Review of Books ''The New York Review of Books'' (or ''NYREV'' or ''NYRB'') is a semi-monthly magazine with articles on literature, culture, economics, science and current affairs. Published in New York City, it is inspired by the idea that the discussion of ...
'', vol. LXVI, no. 20 (19 December 2019), pp. 14, 16, 20. * * * * * * * Woltag, Johann-Christoph: 'Cyber Warfare' in
Rüdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012)
'.


External links

* * {{Authority control Warfare by type Computer security procedures Computing terminology Cybercrime Hacking (computer security) Information sensitivity Mass intelligence-gathering systems Military intelligence collection Military technology National security Sabotage Security engineering Social engineering (security) Hazards