Cyber Operations as an Instrument of Statecraft

Cyber operations are no longer a sideshow in international relations. They have become a core tool of statecraft, sitting alongside diplomacy, economic sanctions, intelligence collection, and military force in the toolkit of every major power. Nation-states conduct cyber operations to steal secrets, disrupt adversaries, influence elections, generate revenue, and prepare the battlefield for potential kinetic conflict.

What makes cyber operations uniquely attractive to governments is their deniability, low cost relative to conventional military action, and the ability to operate below the threshold of armed conflict. A single cyber operation can steal decades of research and development, cripple critical infrastructure, or undermine public trust in democratic institutions, all without firing a shot.

For security professionals, this means that defending networks is no longer purely a technical challenge. Understanding who is attacking, why they are attacking, and what geopolitical events might trigger an escalation is now as important as patching vulnerabilities and monitoring endpoints. This guide provides that strategic context.

Russia: Cyber as a Weapon of War

Russia operates the most aggressive and destructive state cyber program in the world. Russian cyber operations span the full spectrum from espionage and intelligence collection to sabotage and information warfare. The invasion of Ukraine in 2022 marked a turning point, demonstrating how cyber operations integrate with kinetic military action at scale.

The Russia-Ukraine Cyber War

The conflict in Ukraine has produced the most sustained state-on-state cyber warfare in history. In the weeks before and after the February 2022 invasion, Russian military intelligence (GRU) deployed multiple wiper malware families, including WhisperGate, HermeticWiper, IsaacWiper, and CaddyWiper, against Ukrainian government agencies, financial institutions, and critical infrastructure.

The attack on Viasat's KA-SAT satellite network on the day of the invasion disrupted military communications across Ukraine and spilled over into European countries, knocking thousands of German wind turbines offline. This single operation demonstrated both the power and the uncontrollable collateral damage of cyber weapons deployed during wartime.

Russian cyber operations in Ukraine have continued to evolve. GRU-linked groups have increasingly abused legitimate tools and living-off-the-land techniques to evade detection. Russian intelligence services have also conducted sustained campaigns against Ukraine's energy grid, attempting to amplify the impact of kinetic strikes on power infrastructure during winter months.

Beyond Ukraine

Russia's cyber operations extend far beyond Ukraine. SVR (Foreign Intelligence Service) groups like Midnight Blizzard (formerly APT29/Cozy Bear) continue to conduct espionage against Western governments, technology companies, and think tanks. The 2020 SolarWinds supply chain compromise, attributed to the SVR, remains one of the most sophisticated espionage operations ever publicly disclosed.

Russian information operations, including hack-and-leak campaigns and social media manipulation, continue to target elections and public discourse across Europe and North America.

China: The Scale of Strategic Theft

China operates the largest state-sponsored cyber espionage program in the world by volume. Chinese cyber operations are driven by clear strategic objectives: advancing economic development through intellectual property theft, collecting political and military intelligence, and pre-positioning for potential conflict over Taiwan and the South China Sea.

Intellectual Property Theft at Industrial Scale

Chinese state-sponsored groups have systematically targeted virtually every sector of Western economies, from aerospace and defense to pharmaceuticals, semiconductors, and clean energy. The FBI has estimated that Chinese IP theft costs the U.S. economy between $200 billion and $600 billion annually.

Groups like APT41 blur the line between state-directed espionage and financially motivated cybercrime. They conduct both intelligence collection for the Ministry of State Security (MSS) and for-profit intrusions, sometimes simultaneously. This dual-hat model makes Chinese cyber actors particularly prolific and difficult to characterize.

Pre-Positioning in Critical Infrastructure

The Volt Typhoon campaign, disclosed in 2023, revealed that Chinese military hackers had systematically pre-positioned themselves inside U.S. critical infrastructure networks, including water utilities, energy systems, communications, and transportation. Unlike traditional espionage, these intrusions appeared designed to enable disruptive or destructive operations in the event of a future conflict, likely over Taiwan.

This represented a significant strategic escalation. Pre-positioning in civilian infrastructure signals that China views cyber operations as a potential first-strike capability in a kinetic conflict, designed to disrupt U.S. military logistics and civilian systems during the critical early hours of a confrontation.

Iran: Disruption and Retaliation

Iran's cyber program has evolved from rudimentary defacement campaigns into a capable destructive and espionage apparatus. Iranian operations are characterized by their willingness to conduct destructive attacks against civilian targets and their use of cyber operations as a tool of retaliation and coercion.

Destructive Operations

Iran pioneered the use of wiper malware against civilian infrastructure with the 2012 Shamoon attack on Saudi Aramco, which destroyed data on approximately 30,000 workstations. Iranian groups have continued to develop and deploy destructive malware against targets in the Middle East, including Israeli organizations, Bahraini government agencies, and Albanian government systems.

The 2022 attack on Albanian government infrastructure, attributed to Iranian actors, was notable because it triggered NATO's first collective response to a cyber attack against a member state. Iran has also increasingly used hacktivist personas and front groups to conduct operations while maintaining plausible deniability.

Regional Espionage and Influence

Iranian cyber espionage focuses heavily on regional adversaries (Israel, Saudi Arabia, UAE) and on domestic dissidents and diaspora communities. Groups like APT35 (Charming Kitten) are particularly focused on targeting journalists, academics, and activists who are critical of the Iranian government. Iranian operations against U.S. and European targets often spike during periods of heightened tension over the nuclear program or sanctions enforcement.

North Korea: Cyber Crime as State Revenue

North Korea is unique among major cyber threat actors because its primary objective is revenue generation. Facing crippling international sanctions, the Kim regime has turned cyber theft into a significant source of hard currency, funding its nuclear weapons and ballistic missile programs.

Cryptocurrency and Financial Theft

North Korean groups, particularly Lazarus Group (APT38), have stolen billions of dollars from cryptocurrency exchanges, DeFi protocols, and traditional financial institutions. The 2022 Axie Infinity hack alone netted approximately $620 million. U.N. panel of experts reports have estimated that North Korea has stolen over $3 billion in cryptocurrency since 2017, with proceeds directly funding weapons of mass destruction programs.

North Korean operators have also pioneered elaborate social engineering schemes, including creating fake companies and job postings to lure cryptocurrency developers into installing malware. Their IT worker fraud scheme, in which North Korean citizens obtain remote IT jobs at Western companies under false identities, generates additional revenue while providing potential access to corporate networks.

Espionage and Destructive Capability

Beyond financial theft, North Korea maintains espionage capabilities targeting South Korean government and military systems, defectors, and organizations involved in sanctions enforcement. The 2014 Sony Pictures attack and the 2017 WannaCry ransomware outbreak, both attributed to North Korea, demonstrated a willingness to conduct destructive and disruptive operations with global impact.

Emerging Threats and Trend Lines

The geopolitical cyber threat landscape continues to evolve rapidly. Several emerging trends demand attention from security professionals and policy makers.

Critical Infrastructure as a Permanent Target

The Volt Typhoon revelations and Russia's sustained operations against Ukrainian energy infrastructure have made clear that critical infrastructure is not just an occasional target but a permanent front in state-on-state competition. Water systems, power grids, telecommunications networks, and transportation systems are all actively targeted for both espionage and pre-positioning.

Election Interference and Democratic Erosion

State-sponsored interference in elections has become a recurring feature of democratic processes worldwide. Russia, China, and Iran have all been attributed with influence operations targeting elections in the United States, Europe, and the Asia-Pacific region. These operations combine hacking (to steal and leak sensitive information) with social media manipulation and amplification of divisive narratives.

Undersea Cables and Satellite Systems

The physical infrastructure that underpins global communications, particularly undersea fiber optic cables and satellite systems, has emerged as a new domain of geopolitical competition. The Viasat attack in 2022 demonstrated the vulnerability of satellite communications. Reports of Russian submarines operating near undersea cable routes in the Atlantic and Baltic Sea have raised concerns about potential sabotage of internet backbone infrastructure during a conflict.

The Convergence of Cyber and Kinetic Warfare

The Russia-Ukraine war has demonstrated that cyber operations are now fully integrated into conventional military campaigns. Cyber attacks are used to degrade communications before ground offensives, amplify the impact of missile strikes on power infrastructure, and conduct intelligence preparation of the battlefield. Future conflicts between major powers will almost certainly feature this same integration, at even greater scale.

This convergence means that cyber incidents can no longer be analyzed in isolation. A spike in scanning activity against energy infrastructure may signal preparation for kinetic strikes. An espionage campaign against a defense contractor may indicate shifting military priorities. Understanding the geopolitical context transforms raw technical indicators into actionable strategic intelligence.

Why Security Professionals Need Geopolitical Context

The traditional approach to cybersecurity, focused on vulnerabilities, patches, and indicators of compromise, is necessary but insufficient. When your adversary is a nation-state, understanding their strategic objectives, political constraints, and historical patterns of behavior is just as important as understanding their malware.

This is exactly why we created CyberGeoDigest. Our daily briefings combine technical cybersecurity reporting with geopolitical analysis, giving security professionals the full picture they need to make better decisions. Every story is contextualized within the broader strategic landscape, so you understand not just what happened, but why it matters.

Stay ahead of geopolitical cyber threats

Get a free daily briefing that combines cybersecurity intelligence with geopolitical analysis. Nation-state ops, policy shifts, and critical vulnerabilities in 5 minutes.

Subscribe free