Cyberattacks an invaluable part of the military arsenal in 2022

An image of security icons for a network encircling a digital blue earth.
(Image credit: Shutterstock) (Image credit: Shutterstock)

Just over ten years ago, the existence of Stuxnet first became public knowledge. Aimed at Iran, the sophisticated computer worm destroyed nearly one-fifth of that country’s operating centrifuges, which are used to enrich uranium for nuclear power. The bug, which was widely reported to be a joint creation of the U.S. and Israel, was believed to have slowed Iran’s nuclear program by up to two years.

About the author

Eric Trexler is VP Sales Global Governments and Critical Infrastructure at Forcepoint.

Stuxnet was an outlier at the time, but more and more, in fact almost all, countries around the world are integrating cyber strategies into their overall defense capabilities. Cyberattacks affecting Iran, China, the US, Europe, the Ukraine, and many others, haven’t gone away – they’ve increased in prevalence and their implied acceptance as the new norm.

We should expect that cyber activity impacting not just military targets, but government organizations, communications systems, and all critical infrastructure will be one of the first signs of impending physical, or kinetic operations. Look for increased targeted and significant cyber activity and you will be able to determine likely hostile imminent intent.

Cybercrime intermediaries

We’ve already seen how powerful ransomware has become over the past year, and with the backing of a nation state, the tools, techniques and procedures to execute such an attack are perfectly poised to become a central part of warfare. Malicious files can be spread around the world instantly, with low cost and an equally lower risk. Not only do many nation states have the capability to do this themselves, ransomware-as-a-service is also rapidly on the rise.

This month we saw Microsoft warning about six threat actors from Iran undertaking professional ransomware attacks. The US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the FBI reported in September 2021 they have seen more than 400 attacks on US and international organizations involving the Conti ransomware variant alone. This particular variant, while not the most prolific out there, is run as-a-service, which means nation states could pay a third party to carry out attacks on their behalf and cause additional obfuscation and uncertainty.

The UK is no exception. In 2020, the UK government announced its own cyber-attack agency called the National Cyber Force. Drawing on personnel from across UK Government agencies including GCHQ, the MoD and Secret Intelligence Service (MI6), the Force will use cyber operations to disrupt what it sees as hostile state activities, terrorists and criminals threatening the UK’s national security.

Using ransomware or other cyberattack techniques to disrupt governments or critical infrastructure might not seem as directly lethal to citizens as drone strikes or other more physical attacks. However, shutting down hospitals, energy suppliers or food production, all of which has happened this year, can cause great harm and significantly impact people’s lives. In addition, the disruption they can cause in terms of their ability to dictate political outcomes or seed general discontent and confusion in populations should not be underestimated.

Local disruption

A lot of attention is paid to these risks at a national level, but government at a local level can be particularly vulnerable. Without the cybersecurity budget or technologies in place to respond effectively to ransomware, they might pay ransoms without addressing the factors that led them to fall victim in the first place. Additionally, local government will almost certainly be targeted in attacks by foreign military forces.

One recent UK example is Hackney Council, which was hit by an attack in October 2020, that continued to impact the organization’s systems for more than six months, and is thought to have cost as much as £10m to rectify. In a recent survey, approximately one-third of local governments reported falling victim to ransomware in the past year. With so much opportunity to quickly copy and automate these kinds of attacks, combined with the lack of risk to the attackers themselves, that figure is guaranteed to increase.

A growing threat surface

The UK’s National Security Centre has blamed cyber-criminals based in Russia – including a group known as ‘Wizard Spider’ – for several significant ransomware attacks, including one that targeted Ireland’s Health Service Executive and disrupted healthcare for several months, forcing the mass cancellation of routine appointments, blocking access to patient records and delaying testing and treatment services. In the US meanwhile, a disruptive and high-profile ransomware attack on Colonial Pipeline earlier in 2021 caused a fuel supply disruption to a large part of the east coast of the United States.

Smart cities are particularly vulnerable to cyberattacks, as the UK’s National Cyber Security Centre has warned. As more aspects of a traditional city—from transportation to lights to resource management—are connected to the Internet, the more they are at risk of cyber disruption. Connectivity breeds convenience for service consumers, but also for attackers. Earlier this year, a ransomware attack on the Pimpri-Chinchwad Municipal Corporation Smart City in India infected nearly 25 of its project servers, thought to be the first known cyberattack on a smart city. Fortunately no data was lost and the ransom was not paid, but the servers required rebuilding at an estimated cost of half a million pounds.

In addition to local level government targets adversaries will target critical infrastructure supporting cities and military bases crippling not only the local population, but the military’s ability to deploy capabilities to respond to kinetic attacks or project power. We can look no further than modern day hotspots including Ukraine and Taiwan for likely future examples. What does this all mean?

Our expectation is that in 2022 we’ll likely see more cyberattacks from nation states impacting both enterprises and government services globally. Critical infrastructure organizations in particular need protection in order to avoid societal disruption. Calls for a new international treaty to regulate cyber operations – a “digital Geneva Convention” – continue to rumble on. As more governments and governing bodies embark on more regulatory oversight of cyber, the situation is set to evolve further. Diplomacy coupled with strong cyber capabilities will be critical for nation states moving forward to protect their people, their infrastructure, and world peace.

Land and sea borders have historically been the way nation states have protected themselves from direct attack on the homeland, but tomorrow’s conflict will not have that buffer. With all targets only a keystroke away, this is something governments at all levels must take seriously.

Eric Trexler is VP Sales Global Governments and Critical Infrastructure at Forcepoint.

Read more
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
An illustration of a silhouetted thief in motion running while carrying a stolen fingerprint
The 5 worst cyberattacks of 2024
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Fortifying the UK’s energy sector: The cybersecurity imperative in an AI-driven future
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Latest in Security
Data leak
Top home hardware firm data leak could see millions of customers affected
Representational image depecting cybersecurity protection
Third-party security issues could be the biggest threat facing your business
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Android Logo
Devious new Android malware uses a Microsoft tool to avoid being spotted
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Latest in Features
Google Gemini 2.5 and ChatGPT o3-mini
I pitted Gemini 2.5 Pro against ChatGPT o3-mini to find out which AI reasoning model is best
The cast of The Residence peek from a doorway
Netflix's #2 most-watched show is the new madcap whodunnit The Residence –here are 3 more mysteries to stream next
Google AI Mode
I tried Google's new AI mode powered by Gemini, and it might be the end of Search as we know it
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
A collage image showing images from the TV shows The White Lotus on Max, Black Mirror on Netflix and The Handmaid's Tale on Hulu.
I'm pausing my Prime Video, Apple TV+ and Paramount+ subscriptions in April 2025 – here are the 3 streaming services I'm keeping instead
Gemini on a smartphone.
Gemini is pulling ahead of ChatGPT – combining Deep Research with Audio Overviews is one of the best uses of AI I’ve seen so far