One tech power to rule them all is a thing of the past
The relative safety and prosperity that much of the world has enjoyed since 1945 was not accidental. It emerged from a global order, albeit an imperfect one, with established norms and a clear balance of power. In the digital realm, a similar, unwritten order existed. For decades, technology development was largely driven by a single ecosystem, creating a somewhat predictable environment. That era is over. Rising geopolitical tensions are not just reflected in cyberspace; they are often preceded and amplified by cyber operations. Technology itself has become a battleground. It is time to state the obvious: we are in a constant, low-grade cyber war.
From digital espionage to digital artillery
Nation-state cyber activity is not new, but its character has fundamentally changed. What began as clandestine espionage has escalated into overt, disruptive, and destructive warfare conducted below the threshold of a formal military declaration. This evolution can be traced through a series of landmark events.
The 2007 distributed denial-of-service (DDoS) attacks on Estonia were an early warning shot, demonstrating how a nation's critical digital infrastructure could be paralyzed for political purposes [1]. Just a few years later, the Stuxnet worm, widely attributed to the U.S. and Israel, crossed a critical line. It proved that code could be used to cause physical, kinetic damage to industrial control systems, in this case, Iranian nuclear centrifuges [2].
The conflict in Ukraine has served as a grim laboratory for this new form of warfare. Years before the 2022 invasion, Russian state actors conducted pioneering attacks on Ukraine's power grid in 2015 and 2016, causing widespread blackouts [4]. This was followed by the 2017 NotPetya attack, a piece of wiper malware disguised as ransomware. While aimed at Ukraine, it spread globally, inflicting over $10 billion in damages on multinational corporations like Maersk and Merck, illustrating the immense potential for collateral damage in this new domain [5]. The full-scale invasion in 2022 was preceded and accompanied by a relentless campaign of wiper malware, DDoS attacks, and strikes against communication infrastructure, such as the attack on the Viasat satellite network [8, 26].
The technical arsenal of a modern state
The tools and techniques employed by state-sponsored threat actors, often designated as Advanced Persistent Threats (APTs), are characterized by their sophistication and stealth. Their goal is not just to breach a network but to remain there, undetected, for extended periods.
A primary vector is the supply chain attack. The 2020 SolarWinds compromise, attributed to Russia's APT29 (Cozy Bear), is the canonical example. By injecting malicious code into a legitimate software update, the attackers gained access to thousands of high-value government and corporate networks, including parts of the U.S. Treasury and Department of Defense [6]. This method bypasses perimeter defenses by turning a trusted supplier into an unwitting Trojan horse.
Exploiting zero-day vulnerabilities—flaws in software unknown to the vendor—is another hallmark of top-tier APTs. The 2021 mass exploitation of Microsoft Exchange servers by the Chinese state-sponsored group Hafnium showcased the speed and scale of these operations. The attackers used a chain of zero-days to gain access to tens of thousands of organizations globally, exfiltrating emails and installing backdoors before patches could be widely deployed [7].
Once inside a network, these actors practice what is known as "Living Off The Land" (LOTL). Instead of using custom malware that might be flagged by security software, they use legitimate system administration tools already present on the target system—like PowerShell or Windows Management Instrumentation (WMI)—to move laterally, escalate privileges, and exfiltrate data. This makes their activity exceptionally difficult to distinguish from normal network administration.
Most recently, intelligence agencies have warned about Chinese state actor Volt Typhoon pre-positioning itself within U.S. critical infrastructure, including communications, energy, and water systems. This activity is not focused on espionage but on gaining the ability to disrupt these vital services in the event of a future geopolitical conflict, a clear preparation of the digital battlefield [9].
Impact assessment: A war with no front lines
In this conflict, there are no clear boundaries between the battlefield and civilian life. The targets are not just military and government agencies; they are the foundational systems of modern society.
- Critical Infrastructure: Energy grids, water treatment facilities, transportation networks, and telecommunications are prime targets. A successful attack could have devastating real-world consequences, endangering public safety and causing massive economic disruption.
- The Private Sector: Companies are targeted for intellectual property theft, espionage, or disruption. As the NotPetya incident showed, they can also become collateral damage, suffering catastrophic financial losses from a conflict they have no direct part in.
- Democratic Processes: Election systems, political parties, and media organizations are targeted to sow discord, spread disinformation, and undermine public trust in democratic institutions.
- Individuals: Citizens are affected through the disruption of essential services, the theft of their personal data from government or corporate breaches, and their exposure to state-sponsored influence operations designed to manipulate public opinion.
This perpetual conflict forces a costly re-evaluation of risk. The threat of a destructive cyberattack now factors into corporate balance sheets, national security strategies, and international diplomacy. As former U.S. Cyber Command head General Paul Nakasone articulated, the strategy has shifted to "persistent engagement" and "defending forward," acknowledging that this fight must be waged in adversary networks, not just behind our own firewalls [17].
How to protect yourself in a gray zone war
While the scale of nation-state threats can seem overwhelming, organizations and individuals are not helpless. The focus must be on resilience—the ability to withstand, respond to, and recover from an attack.
For Organizations:
- Assume Breach: Operate with the mindset that an attacker is already inside your network or will inevitably get in. This shifts focus from prevention alone to rapid detection and response. Implement robust logging, network segmentation, and Endpoint Detection and Response (EDR) solutions.
- Harden Your Defenses: Implement fundamental security controls without fail. This includes multi-factor authentication (MFA) everywhere, timely patching of all systems (especially internet-facing ones), and enforcing the principle of least privilege.
- Know Your Supply Chain: Vet the security practices of your software and service providers. Require transparency and demand secure development lifecycles. The security of your organization is linked to the security of your least secure vendor.
- Share Threat Intelligence: Participate in information sharing and analysis centers (ISACs) relevant to your industry. A threat seen by a peer today could be the one targeting you tomorrow.
For Individuals:
- Practice Digital Hygiene: Use strong, unique passwords for every account, managed with a password manager. Enable MFA on all critical accounts, especially email and financial services.
- Be Skeptical: State-sponsored actors are masters of social engineering. Be wary of unsolicited emails, messages, and links. Verify requests for information through a separate, trusted communication channel.
- Keep Software Updated: Regularly update your operating system, web browser, and applications. These updates often contain critical security patches that fix vulnerabilities exploited by attackers.
- Protect Your Connection: When using public Wi-Fi, your data can be exposed. Using a reputable VPN service encrypts your traffic, protecting your information from eavesdroppers on untrusted networks.
The silent, ongoing war in cyberspace is the defining geopolitical reality of our time. Acknowledging this reality is the first step toward building the collective defense and resilience required to navigate it.




