The age of cyber-warfare


As technology continues to advance, so does the complexity and power of cyber attacks. Cyberwarfare is the latest trend in a long list to garner widespread attention, and it has shocked governments around the world with the covert threat it presents to infrastructure and businesses. This is why governments and businesses are working tirelessly to repel any attacks which might threaten their citizens and customers.
About the author
Liviu Arsene, Global Cybersecurity Researcher at Bitdefender.
Rising tensions
In recent years, the United States, Israel, and Ukraine have all claimed to have been targeted through cyberwarfare. All of these countries have also retaliated in a variety of ways. These attacks and retaliations, in combination with the recent rise in tensions between Iran and US, have governments on high alert. Although traditional kinetic warfare has dominated the events taking place, American cybersecurity firms and agencies, such as the Cybersecurity and Infrastructure Security Agency, which is the Department of Homeland Security’s computer security branch, has warned customers and businesses to anticipate cyberwarfare attacks from Iranian sources.
The United States is concerned that they will now see a covert nation-state sponsored cyberwarfare effort made to destabilise and disrupt their IT infrastructure, rather than the more confrontational traditional warfare. For example, initial attempts made by individuals succeeded in replacing the home page of the Federal Depository Library Program with an image of a bloodied Donald Trump.
On the same note, in 2014 following comments made by billionaire, Sheldon Adelson, that the United States should use a nuclear weapon against Iran, a highly sophisticated cyber attack used destructive malware to wipe thousands of computers in Adelson’s Las Vegas Sands casino. Attempts made by groups with more resources could target crucial parts of infrastructures and cause serious damage. These scenarios are constantly being evaluated, with countermeasure options being taken into consideration by state officials.
The complexities of cyberwarfare
This is a complicated situation because it is difficult to determine the exact source of a cyber attack, and many groups will often claim that they were responsible, which further complicates the situation. The line between cyber and kinetic warfare is becoming increasingly blurred and if past events are any indication, both dimensions will become symbiotically linked and synonymous with war declarations.
Past state-sponsored cyberattacks on critical infrastructures that have been covered by mainstream media will likely be tagged as training operations performed by nation states in an attempt to acquire veterancy, much like war games are meant to practice tactics and ready troops for military confrontation. This complexity makes cyberwarfare an open form of “cold war” where two nation-states use proxies or covert tactics to wage war with each other while avoiding having to deploy troops and risk lives.
However, cyberwarfare can have real and very expensive implications, as Ukraine discovered when a group, widely believed to be under orders from the Kremlin, managed to bypass the endpoint security systems of the Ukranian power system and disrupted the electricity supply for the entire country. This was the first recorded successful cyber attack against a power grid and showcased the extensive damage that could be caused in a cyberwarfare situation.
The power to potentially cripple energy systems, banks and even targets of strategic military importance will be all the more devastating if it were to take place in a country that was also at kinetic war. A scenario in which a combined attack on key infrastructure points such as water distribution systems, banks, gas pipelines, and hospitals with a coordinated ground invasion could cause serious damage a nation.
Warfare in the next decade
In the wake of political tensions between states, it seems more prudent than ever to understand how warfare may look during the next decade. As cyber attacks and the technology and people behind them develop, defensive systems and governments opposing them need to ensure that their security infrastructure is capable of repelling any attacks. In an interview with the Telegraph in November 2019, former US paratrooper and current advisor to the Pentagon, Sean McFate argued that this is the future of warfare, “That’s the future of war, not tanks. It’s a way to reach into society and to erode it from the inside out. Who needs a blitzkrieg today when you can find fissures in society and expand them?”
Only a few months later we are seeing how realistic these insights were. Cyberwarfare avoids the physical toll and casualties, but in the end, it can be just as destructive and dangerous. Being able to peer into the infrastructure of a government through a computer monitor and bring it to a screeching halt is a truly disturbing vision. One that countless governments and agencies around the world are working to prevent as they help their nation-states employ cyberwarfare defences and initiatives that protect their businesses and their citizens in equal measure. Businesses must continue to plan for cyber attacks, security breaches, data loss, and system infection.
Those who might be caught in this crossfire should start by creating an incident response plan that addresses a wide range of attack scenarios dealing with breaches, infections and data loss. Coupled with comprehensive security solutions purposely built to secure everything from physical to virtual endpoints and servers, regardless of their location. Organisations need to have increased visibility across their entire infrastructure and environments in order to timely detect any potential intrusion. Timely deploying patches, updates, beefing up perimeter security defences, and cybersecurity training for employees in best practices are all recommended to minimise any potential data breach.
Swiftly deploying transparent solutions and training employees in the nuances of cyberwarfare will help to minimise the damage of any potential breaches. In the age of cyberwarfare, one where computers can be just as dangerous as tanks and guns, understanding this is a key insight for those who wish to fully protect themselves in the 21st century.
As technology continues to advance, so does the complexity and power of cyber attacks. Cyberwarfare is the latest trend in a long list to garner widespread attention, and it has shocked governments around the world with the covert threat it presents to infrastructure and businesses. This is why governments and…
Recent Posts
- Here’s when and where you can preorder the new iPhone 16E
- The Humane AI Pin debacle is a reminder that AI alone doesn’t make a compelling product
- This 1.9-pound smartphone’s massive battery offers six months of standby
- Movie sales – including 4K Blu-ray – fell again last year, but if you’re going streaming only, you’re massively missing out
- A new and dangerous keylogger is on the loose – here’s how to stay safe
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010