Geopoliticsanalysis

We are at war

April 2, 20267 min read9 sources
Share:
We are at war

One tech power to rule them all is a thing of the past

The relative safety and prosperity that much of the world has enjoyed since 1945 was not accidental. It emerged from a global order, albeit an imperfect one, with established norms and a clear balance of power. In the digital realm, a similar, unwritten order existed. For decades, technology development was largely driven by a single ecosystem, creating a somewhat predictable environment. That era is over. Rising geopolitical tensions are not just reflected in cyberspace; they are often preceded and amplified by cyber operations. Technology itself has become a battleground. It is time to state the obvious: we are in a constant, low-grade cyber war.

From digital espionage to digital artillery

Nation-state cyber activity is not new, but its character has fundamentally changed. What began as clandestine espionage has escalated into overt, disruptive, and destructive warfare conducted below the threshold of a formal military declaration. This evolution can be traced through a series of landmark events.

The 2007 distributed denial-of-service (DDoS) attacks on Estonia were an early warning shot, demonstrating how a nation's critical digital infrastructure could be paralyzed for political purposes [1]. Just a few years later, the Stuxnet worm, widely attributed to the U.S. and Israel, crossed a critical line. It proved that code could be used to cause physical, kinetic damage to industrial control systems, in this case, Iranian nuclear centrifuges [2].

The conflict in Ukraine has served as a grim laboratory for this new form of warfare. Years before the 2022 invasion, Russian state actors conducted pioneering attacks on Ukraine's power grid in 2015 and 2016, causing widespread blackouts [4]. This was followed by the 2017 NotPetya attack, a piece of wiper malware disguised as ransomware. While aimed at Ukraine, it spread globally, inflicting over $10 billion in damages on multinational corporations like Maersk and Merck, illustrating the immense potential for collateral damage in this new domain [5]. The full-scale invasion in 2022 was preceded and accompanied by a relentless campaign of wiper malware, DDoS attacks, and strikes against communication infrastructure, such as the attack on the Viasat satellite network [8, 26].

The technical arsenal of a modern state

The tools and techniques employed by state-sponsored threat actors, often designated as Advanced Persistent Threats (APTs), are characterized by their sophistication and stealth. Their goal is not just to breach a network but to remain there, undetected, for extended periods.

A primary vector is the supply chain attack. The 2020 SolarWinds compromise, attributed to Russia's APT29 (Cozy Bear), is the canonical example. By injecting malicious code into a legitimate software update, the attackers gained access to thousands of high-value government and corporate networks, including parts of the U.S. Treasury and Department of Defense [6]. This method bypasses perimeter defenses by turning a trusted supplier into an unwitting Trojan horse.

Exploiting zero-day vulnerabilities—flaws in software unknown to the vendor—is another hallmark of top-tier APTs. The 2021 mass exploitation of Microsoft Exchange servers by the Chinese state-sponsored group Hafnium showcased the speed and scale of these operations. The attackers used a chain of zero-days to gain access to tens of thousands of organizations globally, exfiltrating emails and installing backdoors before patches could be widely deployed [7].

Once inside a network, these actors practice what is known as "Living Off The Land" (LOTL). Instead of using custom malware that might be flagged by security software, they use legitimate system administration tools already present on the target system—like PowerShell or Windows Management Instrumentation (WMI)—to move laterally, escalate privileges, and exfiltrate data. This makes their activity exceptionally difficult to distinguish from normal network administration.

Most recently, intelligence agencies have warned about Chinese state actor Volt Typhoon pre-positioning itself within U.S. critical infrastructure, including communications, energy, and water systems. This activity is not focused on espionage but on gaining the ability to disrupt these vital services in the event of a future geopolitical conflict, a clear preparation of the digital battlefield [9].

Impact assessment: A war with no front lines

In this conflict, there are no clear boundaries between the battlefield and civilian life. The targets are not just military and government agencies; they are the foundational systems of modern society.

  • Critical Infrastructure: Energy grids, water treatment facilities, transportation networks, and telecommunications are prime targets. A successful attack could have devastating real-world consequences, endangering public safety and causing massive economic disruption.
  • The Private Sector: Companies are targeted for intellectual property theft, espionage, or disruption. As the NotPetya incident showed, they can also become collateral damage, suffering catastrophic financial losses from a conflict they have no direct part in.
  • Democratic Processes: Election systems, political parties, and media organizations are targeted to sow discord, spread disinformation, and undermine public trust in democratic institutions.
  • Individuals: Citizens are affected through the disruption of essential services, the theft of their personal data from government or corporate breaches, and their exposure to state-sponsored influence operations designed to manipulate public opinion.

This perpetual conflict forces a costly re-evaluation of risk. The threat of a destructive cyberattack now factors into corporate balance sheets, national security strategies, and international diplomacy. As former U.S. Cyber Command head General Paul Nakasone articulated, the strategy has shifted to "persistent engagement" and "defending forward," acknowledging that this fight must be waged in adversary networks, not just behind our own firewalls [17].

How to protect yourself in a gray zone war

While the scale of nation-state threats can seem overwhelming, organizations and individuals are not helpless. The focus must be on resilience—the ability to withstand, respond to, and recover from an attack.

For Organizations:

  1. Assume Breach: Operate with the mindset that an attacker is already inside your network or will inevitably get in. This shifts focus from prevention alone to rapid detection and response. Implement robust logging, network segmentation, and Endpoint Detection and Response (EDR) solutions.
  2. Harden Your Defenses: Implement fundamental security controls without fail. This includes multi-factor authentication (MFA) everywhere, timely patching of all systems (especially internet-facing ones), and enforcing the principle of least privilege.
  3. Know Your Supply Chain: Vet the security practices of your software and service providers. Require transparency and demand secure development lifecycles. The security of your organization is linked to the security of your least secure vendor.
  4. Share Threat Intelligence: Participate in information sharing and analysis centers (ISACs) relevant to your industry. A threat seen by a peer today could be the one targeting you tomorrow.

For Individuals:

  1. Practice Digital Hygiene: Use strong, unique passwords for every account, managed with a password manager. Enable MFA on all critical accounts, especially email and financial services.
  2. Be Skeptical: State-sponsored actors are masters of social engineering. Be wary of unsolicited emails, messages, and links. Verify requests for information through a separate, trusted communication channel.
  3. Keep Software Updated: Regularly update your operating system, web browser, and applications. These updates often contain critical security patches that fix vulnerabilities exploited by attackers.
  4. Protect Your Connection: When using public Wi-Fi, your data can be exposed. Using a reputable VPN service encrypts your traffic, protecting your information from eavesdroppers on untrusted networks.

The silent, ongoing war in cyberspace is the defining geopolitical reality of our time. Acknowledging this reality is the first step toward building the collective defense and resilience required to navigate it.

Share:

// FAQ

What is a 'gray zone' conflict in cybersecurity?

A 'gray zone' conflict refers to hostile actions conducted by state or state-sponsored actors that fall below the threshold of a formal, declared war. In cyberspace, this includes espionage, intellectual property theft, disinformation campaigns, and disruptive attacks on critical infrastructure that are designed to achieve strategic goals without provoking a conventional military response.

Why is critical infrastructure so frequently targeted by nation-states?

Critical infrastructure—such as power grids, water systems, and transportation networks—is targeted for two main reasons. First, for espionage, to understand how these systems work. Second, and more dangerously, to pre-position malicious code for potential use as a powerful coercive tool during a political crisis or as a component of a future military conflict, allowing an adversary to disrupt a nation's ability to function.

How can a small business or individual defend against a powerful nation-state attacker?

While you may not be the primary target, you can be collateral damage or a stepping stone to a larger target. The key is not to be an easy victim. By implementing fundamental security practices like multi-factor authentication (MFA), regular software patching, and employee phishing awareness, you make your organization a much harder target. Attackers often follow the path of least resistance, so strong basic hygiene can cause them to move on to someone else.

What is the 'splinternet' or 'tech decoupling'?

This refers to the growing fragmentation of the global internet and technology ecosystem. Driven by geopolitical competition and national security concerns, countries like the U.S. and China are creating separate technological spheres with different standards, hardware, and data governance rules. This 'decoupling' can stifle innovation, increase costs, and create isolated digital domains, fundamentally changing the nature of the open, global internet.

// SOURCES

// RELATED

Medtech giant Stryker fully operational after data-wiping attack
analysis

Medtech giant Stryker fully operational after data-wiping attack

Medtech giant Stryker recovered from a destructive data-wiping attack by an Iranian-linked group, highlighting the rising threat of geopolitical hackt

6 min readApr 2
Medtech giant Stryker recovers from claimed Iranian wiper attack, highlighting critical infrastructure risks
analysis

Medtech giant Stryker recovers from claimed Iranian wiper attack, highlighting critical infrastructure risks

Medtech giant Stryker restored systems after a claimed wiper attack by the Iranian-aligned Handala group, a stark reminder of geopolitical cyber threa

5 min readApr 2
The FCC's ban on Huawei and ZTE equipment: A deep dive into the national security ruling
analysis

The FCC's ban on Huawei and ZTE equipment: A deep dive into the national security ruling

The FCC has prohibited new equipment from Huawei, ZTE, and others over national security risks. We analyze the technical concerns and what it means fo

6 min readApr 2
China-linked Red Menshen uses stealthy BPFDoor implants to spy via telecom networks
analysis

China-linked Red Menshen uses stealthy BPFDoor implants to spy via telecom networks

A long-term espionage campaign by a China-nexus actor uses the BPFDoor implant to infiltrate telecom networks, creating a stealthy path to spy on gove

6 min readApr 2