Cyberwarfare in All Its Aspects
Cyberwarfare is the employment of cyberattacks against an enemy state in order to cause comparable harm to actual warfare and/or disrupt crucial computer systems. Espionage, sabotage, propaganda, manipulation, and economic warfare are all possible effects.
Experts disagree on the meaning of "cyberwarfare", as well as whether such a thing exists at all. According to one point of view, the word "cyberwar" is a misnomer because no cyber strikes have ever been classified as war. Another point of view is that it is an appropriate title for cyberattacks that inflict physical harm on people and objects in the real world.
Many countries have active cyber capabilities for offensive and defensive activities, including the United States, the United Kingdom, Russia, China, Israel, Iran, and North Korea. As states investigate the use of cyber operations and combine capabilities, the risk of physical confrontation and violence occurring as a result of, or as part of, a cyber operation grows. However, matching the scale and duration of the battle is unlikely, therefore, ambiguity persists. On May 5, 2019, the Israel Defense Forces struck and destroyed a structure involved with an ongoing cyber-attack, which resulted in the loss of human life.
If you're wondering what cyberwarfare is, read our essay, which covers all facets of cyberwarfare and answers the following questions:
-
What is Cyberwarfare?
-
What are cyberwarfare weapons?
-
What is the main purpose of cyberwarfare?
-
What Are the Types of Cyberwarfare?
-
Examples of Cyberwarfare Operations
-
What are the effects of cyberwarfare?
-
What are the rules of cyberwarfare?
-
How to Combat Cyberwarfare?
-
What country has the best cyber-warfare?
-
Who is a Cyberwarfare Officer?
-
What is the salary of a Cyberwarfare Officer?
-
Cyberwarfare History and Latest Conflicts
-
What is the difference between cyberwarfare and cyberterrorism?
What is Cyberwarfare?
Warfare based on specific uses of ICTs within an offensive or defensive military strategy endorsed by a state and aimed at the immediate disruption or control of the enemy's resources, and waged within the informational environment, with agents and targets ranging both on the physical and non-physical domains, and whose level of violence may vary depending on circumstances.
Cyberwarfare is often defined as a collection of measures taken by a nation or group to attack computer network systems of other countries or organizations with the purpose of disrupting, damaging, or destroying infrastructure through computer viruses or denial-of-service attacks. It has the capacity to devastate government and civilian infrastructure and disrupt essential systems, resulting in state harm and perhaps death.
However, there is disagreement among cybersecurity professionals over what constitutes cyberwarfare. The US Department of Defense (DoD) recognizes the threat to national security presented by malicious Internet use but does not define cyberwarfare clearly. Some define cyberwarfare as a computer attack that can lead to death.
In most circumstances, cyberwarfare involves a nation-state carrying out cyber attacks on another, but in certain cases, the attacks are carried out by terrorist organizations or non-state actors attempting to further the goals of a hostile nation. There have been multiple instances of claimed cyberwarfare in recent history, but there is no universal, formal definition of what constitutes an act of war.
What are Cyberwarfare Weapons?
A cyberweapon is commonly defined as a malware agent used in a cyberattack for military, paramilitary, or intelligence purposes. A cyber weapon is defined as a computer code that is used or intended to be used to threaten or cause physical, functional, or mental harm to structures, systems, or living beings. This includes computer viruses, trojans, spyware, and worms, which can introduce corrupted code into existing software, causing a computer to perform unintended actions or processes.
A cyberweapon is also defined as any device or set of computer instructions designed to unlawfully damage a system acting as a critical infrastructure, its information, data, or programs contained in or relevant thereto, or even to facilitate the interruption, total or partial, or alteration of its operations.
According to the definitions above, cyber weapons can range from Denial of Service attacks (which typically have a low level of penetration) to "tailored" malware like Stuxnet, which has high intrusiveness and a low rate of collateral damage. As a result, it may be prudent to evaluate cyberweapons in their domain of relevance, cyberspace, with the distinct possibility of crossing virtual boundaries and extending to the real world.
The following benefits make cyberweapons very appealing to "small" states that, despite having limited military budgets, can compete with the most powerful countries in the new domain. Currently, nearly 140 countries around the world are working to develop offensive cyberwarfare capabilities.
Cyber weapons are used in addition to conventional military strikes. Cyber weapons are used for the following purposes:
-
Aid offensive operations by destroying enemy defense/critical infrastructure.
-
Examine the adversary's technological capabilities by assessing an agent's ability to infect the enemy's system.
The primary advantages of cyber weapons are as follows:
-
Cyber weapons are more effective and less expensive.
-
The attack is launched at the speed of light.
-
Cyber weapons are less noticeable (stealth weapons) - no one wants to admit their system's flaws.
-
Attribution is difficult - the ability to operate undercover makes cyberweapons very appealing.
-
Cyber weapons are offensively dominant and ideal weapons for asymmetric warfare - the warfare of the twenty-first century.
-
The preparation phase of cyberweapons is easy to conceal from prying eyes, and the development of cyberweapons is difficult to detect.
What is the Main Purpose of Cyberwarfare?
Cyberwarfare aims to achieve the same objectives as traditional warfare but through different means. The goal of cyberwarfare, according to the Cybersecurity and Infrastructure Security Agency (CISA), which is part of the US Government's Department of Homeland Security (DHS), is to "weaken, disrupt, or destroy" the target nation-state.
An attacker in traditional warfare frequently attempts to disrupt a nation-operations, by having states collect intelligence about its plans, and use propaganda to sway public opinion and damage morale. Disruption of civilian institutions (banks, stores, transportation, etc.) is used in cyberwar to cause confusion and divert attention and resources away from the war effort.
While these objectives are met with human personnel and military hardware, an attacker can achieve them through cyberattacks and cyberespionage. Because of the increased reliance on computer systems, cyber espionage is frequently more effective than traditional espionage.
The various goals of cyberwarfare are categorized as follows:
-
Military: This is done in order to seize control of the target country's military cyberspace.
-
Civil: This is done to create fear among the people of the target country. Hacktivism is used to spread a specific ideology among people in the target country.
-
Income Generation: This is done in order to obtain monetary benefits from the people who live in the target country. Financial institutions are typically looted using income-generation cyberwarfare.
-
Nonprofit Research: Sometimes cyberwarfare is carried out for the benefit of a country. For example, if the world is in a crisis and one country has solutions, that country usually implements them and shares them with other countries for the betterment of the world as a whole.
What Are the Types of Cyberwarfare?
Cyberwarfare can pose a variety of threats to a nation. Cyberattacks, at their most basic, are used to supplement traditional warfare. For example, using cyber means to interfere with the operation of air defenses in order to facilitate an air attack. Aside from these "hard" threats, cyberwarfare helps with "soft" threats like espionage and propaganda.
The following are some of the most common types of cyberwarfare attacks:
-
Sabotage: Computers and satellites that coordinate other activities are vulnerable system components that could cause equipment to fail. Military system compromises, such as C4ISTAR components responsible for orders and communications, could result in their interception or malicious replacement. Power, water, fuel, communications, and transportation infrastructure are all affected. The civilian realm is at risk, noting that security breaches have already gone beyond stolen credit card numbers and that potential targets include the electric power grid, trains, and the stock market.
-
Espionage: Espionage is the practice of spying on other countries in order to steal secrets. This includes using botnets or spear phishing attacks to compromise sensitive computer systems before exfiltrating sensitive information in cyberwarfare. 25% of all cyberattacks are motivated by espionage. The following are some examples of espionage-based cyberattacks:
- Edward Snowden revealed massive US spying on many countries.
- Following the revelation of the NSA's spying on German Chancellor Angela Merkel, the Chancellor compared the NSA to the Stasi.
- Without the permission of the Bahamian government, the NSA recorded nearly every cell phone conversation in the Bahamas, as did similar programs in Kenya, the Philippines, Mexico, and Afghanistan.
- Since 2003, "Titan Rain" has been probing the computer systems of American defense contractors.
- The data breach at the Office of Personnel Management in the United States has been widely blamed on China.
- The security firm Area 1 disclosed details of a three-year-long breach that compromised one of the European Union's diplomatic communication channels.
-
DoS (Denial-of-Service) Attacks: DoS attacks prevent legitimate users from accessing a website by flooding it with bogus requests and forcing the website to deal with them. DoS attacks are used to disrupt critical operations and systems, as well as to prevent civilians, military personnel, security personnel, or researchers' organizations from accessing sensitive websites.
DoS attackers frequently target sites or services hosted on high-profile web servers, such as banks, credit card payment gateways, and even root name servers. To carry out these large-scale attacks, DoS attacks frequently use internet-connected devices with vulnerable security measures. DoS attacks are not limited to computer-based methods; strategic physical attacks on infrastructure can be equally damaging. Cutting undersea communication cables, for example, severely limit the ability of some regions and countries to conduct information warfare.
-
Electrical Power Grid: Attacking the power grid gives attackers the ability to disable critical systems, disrupt infrastructure, and potentially cause bodily harm. Power grid attacks disrupt communications, rendering services such as text messages and communications inoperable. It would be possible to disconnect the power grid from the Internet and only use droop speed control. Massive power outages caused by a cyber attack could disrupt the economy, divert attention from a concurrent military attack, or cause national trauma.
-
Propaganda Attacks: Propaganda attacks are attempts to influence the minds and thoughts of people living in or fighting for a specific country. Propaganda is used to expose embarrassing truths and spread lies in order to cause people to lose faith in their country or side with their enemies.
Cyberpropaganda is an attempt to control information in any form and influence public opinion. It is a type of psychological warfare, but it is carried out through social media, fake news websites, and other digital channels. In 2018, Sir Nicholas Carter, Chief of the General Staff of the British Army, stated that this kind of attack from actors such as Russia "is a form of system warfare that seeks to de-legitimize the political and social system on which our military strength is based." Today, the internet is the most important mode of communication. People can quickly communicate their messages to a large audience, which can allow evil to flourish. Terrorist organizations may take advantage of this and use it to brainwash people.
-
Economic Upheaval: Computers are used in the majority of modern economic systems. Attackers can target computer networks of economic institutions such as stock exchanges, payment systems, and banks in order to steal money or prevent people from accessing the funds they require. WannaCry and Petya (not Petya) ransomware cyber attacks in 2017 caused widespread disruptions in Ukraine, as well as in the United Kingdom's National Health Service, pharmaceutical giant Merck, Maersk Shipping Company, and other organizations around the world.These attacks are classified as cybercrimes, specifically financial crimes because they have a negative impact on a company or group.
-
Attacks by Surprise: These are the cyber equivalents of Pearl Harbor and 9/11. The goal is to launch a massive attack that the enemy does not expect, allowing the attacker to weaken their defenses. In the context of hybrid warfare, this can be done to prepare the ground for a physical attack.
What are the Examples of Cyberwarfare Operations?
While determining the source of a cyberwar attack can be difficult, some cybersecurity attackers can be identified by their attack methods, malware code, or information obtained through covert channels. Here are a few examples of cyberwarfare attacks that were notable not only for their size and scope, but also for the amount of evidence available to identify the perpetrators:
-
In 2007, Estonia moved the Bronze Soldier, a statue associated with the Soviet Union, from the center of Tallinn to a military cemetery near the city. In the months that followed, Estonia was subjected to a number of significant cyberattacks. Massive denial of service (DoS) attacks overwhelmed Estonian government websites, media outlets, and banks, forcing them to go offline. A botnet of over a million computers launched a distributed denial of service attack on the Estonian government, business, and media websites. Russia was suspected of being the source of the cybersecurity attack, which was motivated by political tensions between the two countries.
-
In 2009, a cyber spy network called "GhostNet", thought to be Chinese, though the Chinese government denied it, hacked into governmental and private organizations in over 100 countries and exfiltrated confidential information.
-
In mid-July 2010, security experts discovered Stuxnet, a malicious software program that infiltrated factory computers and spread to plants all over the world. According to The New York Times, it is regarded as "the first attack on critical industrial infrastructure that sits at the foundation of modern economies". The Stuxnet computer worm used a cyberattack on the Iranian nuclear fuel processing facility to physically destroy almost 1,000 uranium enrichment centrifuges. It ranks among the most advanced cyberattacks ever. The malware targeted data acquisition and supervisory control systems and spread through infected Universal Serial Bus devices. Most reports claim that the attack severely harmed Iran's capacity to produce nuclear weapons. The evidence suggests that the worm was developed jointly by Israel and the United States under the name "Operation Olympic Games".
-
In 2014 The publisher, Sony Pictures, came under fire after the movie "The Interview," which gave a bad impression of Kim Jong Un, was released. Unsurprisingly, North Korean government hackers were blamed for the cyberattack. The FBI found code, encryption algorithms, and data deletion techniques that were similar to earlier malware attacks carried out by North Koreans.
-
According to CrowdStrike, between 2014 and 2016, Ukrainian rocket forces and artillery were targeted by the Russian-organized cybercrime group Fancy Bear. The D-30 Howitzer artillery unit used an infected Android application to manage targeting data, which is how the malware was spread. Officers in Ukraine frequently used the app, which contained the spyware known as X-Agent. With more than 80% of Ukraine's D-30 howitzers destroyed, this attack is regarded as being very successful.
-
An American Republican fundraiser named Elliott Broidy sued the government of Qatar in 2018, alleging that it had stolen and leaked his emails in an effort to damage him. He was allegedly seen by the Qataris as a barrier to them gaining more respect in Washington. The lawsuit claimed that the Qatari Emir's brother, along with other members of the ruling family, had organized a cyberwarfare campaign. The same attackers targeted 1,200 people, many of whom were well-known "enemies of Qatar", including senior officials from Bahrain, Egypt, Saudi Arabia, Egypt, and the United Arab Emirates.
What are the Effects of Cyberwarfare?
Any cyberattack, including cyberwarfare, could target governments and businesses. Companies in critical infrastructure sectors, such as communications, energy, the defense industrial base, emergency services, banking, and agriculture, may be more vulnerable to this. However, depending on the goals of the hostile government, any business or government could become a victim.
The following are some of the consequences of cyberwarfare:
-
Nation-to-Nation Conflicts: International conflicts are being fueled by cyberwarfare. Cyberwarfare has the capability of being both offensive and defensive. Numerous cybercriminals are gathering data and buying and selling sensitive information to the highest bidder without regard for the consequences. As a result of this action, global national security may be jeopardized.
-
Disruption of Critical Government Services: The international system is currently grappling with the function of identities and social practices. In today's socially connected society, cyberwarfare could disrupt vital government functions such as electricity, healthcare, and banking services.
-
Disruption of Transportation: Hackers may attempt to take over or interfere with airport and train station workstations and servers. This could cause train and plane delays, aviation and rail traffic congestion, and other types of lengthy delays.
-
The Effect on the Private Sector: Cyberwarfare has not only harmed the government sector, but it has also had a significant negative impact on the private sector. Every day, the world faces millions of cyberattacks, but most of them go unnoticed due to a lack of media coverage.
-
Opinion Influencing: Cyberwarfare affects not only information management but also public opinion formation. Terrorist organizations are using this medium, making the Internet an open door for evil. Through cyberwarfare, one nation can strengthen its position by weakening others. Furthermore, it is difficult to understand whether such specific behaviors could be considered an act of war.
-
Impact on Stock Prices: A cyber-attack could result in bank balances becoming zero. Furthermore, if hackers leak data, stock prices may fluctuate. Large losses are possible, but some people may benefit because they can buy stocks for less money.
What are the Rules of Cyberwarfare?
It is estimated that over 100 countries have developed or are developing military cyber capabilities. Fortunately, cyber operations during armed conflict are governed by international humanitarian law (IHL).
Every day, however, countless cyber operations, ranging from cyber espionage to what many refer to as "state-sponsored operations", take place. Many people believe that IHL does not apply to cyber operations conducted in the context of an armed conflict.
Without a doubt, the question of whether IHL applies to cyber operations is a source of contention in the UN-mandated cyber processes. Nobody here denies that IHL is applied to cyber operations during a conflict.To say otherwise would create the absurd situation in which a missile attack on a hospital is prohibited by IHL, but this prohibition does not protect the same hospital's computers, medical devices, and networks from the dangers of cyberattacks.
The law is clear on this: the IHL limits cyber operations during an armed conflict, just as it limits the use of other weapons, tools, and methods of warfare in an armed conflict, whether new or old.
The International Court of Justice has also agreed with this viewpoint.
A more complicated question is whether a cyber operation can itself result in IHL enforcement. With regard to international armed conflicts, the consensus is that "There always exists an armed conflict between states where armed force is used". But, when does that point arrive in cyber operations that do not physically destroy or damage military or civilian infrastructure? This is still unclear.
As a result, regardless of their level of technological development, military cyber capabilities, or involvement in armed conflict, all states are concerned about effectively orchestrating cyber operations during armed conflict.
One of the strengths of international humanitarian law is that it is intended to apply to "any war and any weapon", including "future law", as the International Court of Justice has stated.
The fundamental rules are straightforward and are as follows:
-
Targeting civilians and civilian objects is prohibited
-
Indiscriminate weapons and attacks are prohibited
-
Disproportionate attacks are prohibited
-
Medical services must be valued and safeguarded
All military operations, whether kinetic or cyber, must follow the same rules and principles, including those of humanity, military necessity, discrimination, proportionality, and precaution. However, there are some issues that are hotly debated among states and other experts and must be clarified. For example, there is debate over whether civilian data in cyberspace is afforded the same level of protection as civilian objects. Such disagreements over legal interpretations have always existed without calling the law into question.
Determining whether a new cyberspace convention is required goes far beyond the use of cyber operations during armed conflict; it involves a much broader range of international law issues.
If new rules for regulating cyber operations during armed conflict are developed, they should improve and strengthen the existing legal framework, particularly IHL. And, until additional rules are developed, any cyber operation during a gunfight must adhere to the current IHL rules.
How to Combat Cyberwarfare?
The Tallinn Handbook is the only place where cyberwarfare is addressed by law. The Tallinn Manual, a textbook that addresses rare but serious cyber threats, has been published by the Cooperative Cyber Defense Center of Excellence (CCDCoE). This manual explains when cyberattacks violate international law and how countries should respond. Some methods used for against cyberwarfare are summarized below:
-
Protecting the Private Sector: The resilience of local businesses to cyberattacks is a strategic factor in cyberwarfare. Businesses must strengthen their security measures to mitigate the benefits of a nation-state attack. The following is a set of corporate cybersecurity measures that can promote national security:
- Make it difficult to breach the network.
- Use web application firewalls (WAF) to detect, investigate, and block malicious traffic as quickly as possible.
- Respond quickly to a breach and resume normal business operations.
- Encourage collaboration between the public and private sectors.
- Use local hackers to help defend against foreign cyber threats.
-
Deploying Layered Defense: Many governments have issued operational national security policies to protect their information infrastructure in response to the threat of cyberwarfare. These policies typically employ a defense-in-depth strategy that includes the following:
- Keeping the cyber ecosystem safe
- Increasing cybersecurity awareness
- Open standards for combating cyber threats are being promoted.
- Putting in place a national cybersecurity assurance framework
- Collaboration with private sector organizations to improve cybersecurity capabilities
-
Using Cyber Wargames to Conduct Risk Assessments: A real-life exercise or simulation, also known as a "cyber wargame", is the best way to assess a nation's readiness for cyberwarfare. A wargame can be used to test how governments and private organizations respond to a cyberwarfare scenario, expose gaps in the defense, and improve inter-entity cooperation. Above all, a wargame teaches defenders how to react quickly in order to protect critical infrastructure and save lives. Cyber wargames can help cities, states, and countries improve their cyberwarfare readiness by:
- Different scenarios are being tested, such as detecting attacks in their early stages or mitigating risks after critical infrastructure has already been compromised.
- Testing unusual scenarios: attacks are never conducted "by the book". The defenders can learn how to mitigate real threats by forming a "red team" that acts as attackers and attempts to find novel ways to breach a target system.
- Division of labor and cooperation mechanisms: cyberwarfare necessitates the collaboration of many individuals from various organizations and government units. A cyber wargame can bring people who may not know each other together and help them decide how to collaborate in the event of a crisis.
-
Improving Policies: While governments may develop cyberwarfare policies, they must put them to the test. A cyber wargame can put policies to the test and provide an opportunity to improve them. Despite this, the legal status of this new field remains unknown because there is no international law governing the use of cyberweapons.
What Country Has the Best Cyberwarfare?
According to the Belfer Center for Science and International Affairs at Harvard's Kennedy School, the world's most powerful cyber countries are, naturally, those with the best cyberwarfare:
-
United States of America
-
China
-
Great Britain
-
Russia
-
Netherlands
-
France
-
Germany
-
Canada
-
Japan
-
Australia
Are you surprised that certain countries did not make the top ten list?
Israel is ranked as the eleventh most powerful nation in cyberspace, tied with Australia. Estonia is ranked 14th.
Who is Cyberwarfare Officer?
Officers in cyberwarfare command crews that use cyber offensive tactics to target enemy or hostile adversary capabilities. To ensure operational readiness, they oversee mission planning, preparation, and crew training. Cyberwarfare officers operate cyberspace systems and train crews on how to use them.
The following are the responsibilities of cyberwarfare officers:
-
They operate cyberspace weapons systems, use cyberspace capabilities, and command crews in order to complete cyberspace, training, and other missions.
-
They go over mission tasks, intelligence, terrain, and weather data.
-
They are in charge of cyber mission planning, preparation, and the briefing/debriefing of crew members.
-
Prior to execution/deployment, they ensure that the equipment and crew are mission ready.
-
They operate cyberweapons systems and command crews. They perform, supervise, or direct the use of weapons systems and related crew activities.
-
They ensure that the crew is operationally ready by conducting or supervising mission-specific training.
-
They are responsible for translating operational requirements into architectural and technical solutions.
-
They collaborate with commanders to provide comprehensive capabilities that include both technical and procedural components.
-
They conduct or supervise technological research and advise commanders on associated risks and mitigation factors in conjunction with meeting requirements.
-
They direct the extension, employment, reconfiguration, adaptation, and creation of portions of cyberspace to ensure combatant commanders' mission success.
-
They prepare, plan, and respond to scenarios involving deliberate and crisis action.
-
They create plans and policies, monitor operations, and provide cyber-operations advice to commanders.
Officers in cyberwarfare receive the following training:
Officers typically join the military after completing a four-year college degree; enlisted service members advance to officer positions through a variety of routes and earn a degree while serving.
Officers in cyberwarfare may have a background in computer science or a related field. They, like all other officers, go through a rigorous training program that covers responsibilities, military structure and etiquette, traditions, and leadership development. Furthermore, cyberwarfare officers are given specialized training both on the job and in the classroom.
Officers in charge of cyberwarfare Work Environment: Cyberwarfare officers are stationed in offices or command and control centers on land or on ships.
What is the Salary of Cyberwarfare Officer?
The average annual salary for a cyberwarfare analyst in the United States is $95,521 as of January 4, 2023.
If you need a quick salary calculator, that works out to be around $45.92 per hour. This equates to $1,836 per week or $7,960 per month.
In the United States, the majority of cyberwarfare salaries currently range from $60,000 (25th percentile) to $113,500 (75th percentile), with top earners (90th percentile) earning $146,500 per year. The average pay range for a cyberwarfare Officer varies greatly (by up to $53,500), implying that there may be numerous opportunities for advancement and increased pay based on skill level, location, and years of experience.
Ten cities where the average salary for a cyberwarfare job is higher than the national average:
San Mateo, CA, tops the list, with Boston, MA, and Daly City, CA, close behind in second and third place, respectively. Daly City, CA, outperforms the national average by $15,047 (15.8%), and San Mateo, CA, outperforms the national average by another $16,669 (17.5%).
With average salaries higher than the national average in these ten cities, the opportunities for economic advancement by changing locations as a form of cyberwarfare appear to be extremely fruitful.
At least five jobs in the cyberwarfare job category pay more per year than the average cyberwarfare salary. Senior Cybersecurity Consultant, Cyber Systems Engineer, and Cyber Architect are just a few examples.
All of these positions pay between $39,864 (41.7%) and $47,901 (50.1%) more than the average cyberwarfare salary of $95,521. If you are qualified, being hired for one of these related cyberwarfare jobs may allow you to earn more money than the average cyberwarfare position.
Cyberwarfare History and Latest Conflicts
Robert Tappan Morris created the world's first internet computer worm. He was a Cornell University student. Mr. Morris claimed he did it to test the size of cyberspace, but it quickly evolved into a virus that cost between $10 million and $100 million to repair.
The most significant cyberattack in history was arguably the 1999 Jonathan James attack on NASA and the United States Department of Defense, particularly because the attack compromised such trusted, high-profile organizations.
A 15-year-old named Jonathan James was able to gain access to the computers of the United States Department of Defense (DOD) and install a backdoor within its servers. He then used the backdoor to intercept internal emails containing usernames and passwords.
After gaining access to the DOD's system, James stole NASA software used to support the International Space Station.
Stuxnet, the first cyberweapon designed to cause physical harm, launched cyberwarfare in 2010. Stuxnet is said to have destroyed 20% of the centrifuges used by Iran to build its nuclear arsenal.
Then, between 2014 and 2016, Russia carried out a series of strategic attacks on Ukraine and the German parliament. During the same time period, China stole information from the US Office of Personnel Management by hacking 21.5 million employee records.
And finally, in 2022 While Russia launched multiple cyberattacks against Ukraine this year, the hacktivist collective Anonymous declared war on Russia in late February 2022, claiming to have attacked Russia's Ministry of Defense. Other hacktivist groups attacking Russia include Ghostsec (an Anonymous spinoff), Against the West, SHDWsec, the Belarussian Cyber Partisans, and Raidforums Admin.
In the last eight years, there have been numerous examples of cyberwarfare:
-
Russian DDoS attack on Ukraine in March 2014: This is allegedly the second time Russia has coordinated military and cyber-attack. While Russian-armed pro-Russian rebels were seizing control of Crimea, a DDoS attack 32 times larger than the largest known attack disrupted the internet in Ukraine.
-
Russia vs. Ukrainian election commission, May 2014: A Russian-based hacking group took down Ukraine's election commission as well as a backup system three days before the presidential election. The attack was intended to cause confusion and aid the pro-Russian candidate.
-
Russia vs. German parliament, June 2015: German investigators discovered that hackers had infiltrated the German Bundestag's computer network.The BfV, Germany's domestic intelligence service, later stated that the attack was carried out by Russia and that they were looking for information on the operations of the Bundestag, German leaders, NATO, and others.
-
China vs. US Office of Personnel Management, June 2015: The records of 21.5 million US government employees and unsuccessful applicants were stolen from the US Office of Personnel Management. According to US government sources, the hacker was the Chinese government.
-
In December 2016, Ukraine experienced its second Russian-caused power outage: It is believed that Russian hackers hid in a power supplier's network for six months before shutting down the power. The power outage cost about a fifth of Kiev's power consumption that night. This attack occurred almost exactly one year after the December 2015 cyber-attack that knocked out power to 225,000 people in western Ukraine.
-
WannaCry: May 17, 2017. It is estimated that this attack affected over 200,000 computers in 150 countries. WannaCry was a ransomware that targeted Microsoft Windows computers.
-
NotPetya, June 2017: This is the first major case of weaponized ransomware. The NotPetya malware masqueraded as ransomware, but its true purpose was to destroy files. While the attack began in Ukraine, it quickly spread throughout the world. It is unclear how much damage was done during this attack, but it is estimated that the total damage was more than $10 billion USD.
What is the Difference Between Cyberwarfare and Cyberterrorism?
Many people mix up cyberwarfare and cyberterrorism.
The motivation of a cyberterrorist is political in nature. Their actions will most likely have a "mass disruption" effect. The cyberterrorist's goal is not necessarily to kill anyone, but rather to disrupt services. An attack on any critical infrastructure controlled by technology can cause significant disruption and elicit a hysterical response from its citizens. The cyberterrorist is most likely part of an organized group, but his or her use of the act may have been hasty. All of these characteristics distinguish cyber terrorism from cyberwarfare. For example, cyberwarfare differs from cyberterrorism in that it is an organized effort by a nation-state to conduct cyberspace operations against foreign nations. This category includes the use of the Internet for intelligence gathering.
The terms "cyberterrorism" and "cyberwarfare" are frequently used in today's media. Many people are concerned about cyberwar, and many believe that terrorism is evolving to become more digitized.