The Quiet Reality of Cyber Warfare
Cyber warfare is a phrase that gets used a lot.
It tends to appear in headlines whenever geopolitical tensions rise. The idea is often framed in dramatic terms; hackers shutting down cities, disabling power grids, or bringing entire nations to a halt overnight. But the reality of cyber conflict is usually much less cinematic.
That doesn’t make it less serious. In many ways, it’s more complex than the popular narrative suggests.
Cyber Conflict Is Already Constantly Happening
One of the biggest misconceptions about cyber warfare is that it’s something that only happens during major geopolitical crises. In reality, it’s happening continuously.
Recent analysis found that cyber operations attributed to Russia against NATO countries increased by around 25% in a single year, targeting governments, research institutions, and NGOs across the alliance.
Most of these activities never make headlines. They involve things like:
- intelligence gathering
- probing networks for vulnerabilities
- stealing sensitive data
- gaining long-term access to systems
Cyber conflict is less about a single dramatic attack and more about persistent pressure in the background.
Access Is Often the Real Objective
In traditional warfare, destroying a target is often the primary objective. In cyber operations, gaining access can be far more valuable.
Once attackers establish a foothold inside a network, they can:
- quietly collect intelligence for months or years
- map systems and infrastructure
- monitor communications
- prepare future disruptive actions
Sometimes that access is never used publicly. It simply sits there as a strategic advantage. In that sense, cyber operations often resemble intelligence work more than battlefield action.
When Cyber Does Become Disruptive
Although espionage dominates most state activity, there have been notable disruptive cyber incidents.
One of the clearest examples occurred in Ukraine in 2015, when attackers compromised the systems of energy distribution companies and cut power to approximately 230,000 people for several hours.
It was the first publicly acknowledged cyberattack to successfully disrupt an electrical power grid.
A year later, another attack targeted Kyiv’s power infrastructure using malware known as Industroyer, specifically designed to manipulate industrial control systems used in electricity networks.
These incidents demonstrated something important: cyber operations can move beyond digital systems and affect the physical world.
The Ripple Effects of Cyber Operations
Cyber attacks can also have consequences far beyond their original target.
A good example is NotPetya in 2017. The malware initially spread through Ukrainian networks but quickly escaped into global systems, affecting companies across Europe, the United States, and beyond.
Major multinational organisations experienced widespread disruption to operations, logistics, and supply chains. What began as a regional cyber operation became a global incident within hours.
This is one of the defining features of cyber conflict: digital attacks do not respect geographic borders.
Civilian Infrastructure Is Often the Battlefield
Another important reality is that cyber conflict rarely stays confined to military networks. Civilian systems are frequently affected.
In 2023, a major cyberattack against Ukraine’s largest telecommunications provider disrupted mobile and internet services for over 24 million subscribers, impacting communications and even air-raid warning systems in some regions.
Telecommunications, energy, transportation, healthcare, and finance systems are all potential targets.
That means private companies often sit on the front line of geopolitical cyber activity whether they realise it or not.
Attribution Complicates Everything
Another major difference between cyber conflict and traditional warfare is attribution. When a missile is launched, it’s usually obvious where it came from.
When a cyberattack occurs, determining responsibility can take weeks or months and often relies on technical indicators, intelligence assessments, and geopolitical context. Even then, attribution is sometimes disputed.
This uncertainty creates a grey zone where states can operate aggressively while maintaining a degree of plausible deniability.
The Quiet Persistence of Cyber Conflict
Perhaps the most important thing to understand about cyber warfare is that it rarely begins or ends with a single event. Instead, it unfolds slowly and continuously.
Networks are scanned. Credentials are stolen. Systems are infiltrated and mapped.
Most of this activity never becomes public, but it creates an environment where cyber operations are quietly shaping geopolitical competition in the background.
A Different Kind of Battlefield
Cyber warfare doesn’t look like traditional warfare. There are no front lines.
The “battlefield” often includes:
- private companies
- supply chains
- cloud infrastructure
- telecommunications networks
- critical national infrastructure
Security teams in commercial organisations can find themselves protecting systems that hold strategic value to governments and adversaries alike. That’s one of the defining challenges of the modern cyber landscape.
Understanding the Reality
Cyber warfare is often described in dramatic terms, but the reality is usually quieter.
It’s persistent rather than explosive. Strategic rather than theatrical. And often invisible to anyone outside the organisations directly affected.
The most important cyber operations rarely make headlines.
They happen long before anyone notices.
next up
Is TikTok a Threat to Cyber Security?
If you know anyone below the age of 20, chances are you’ve heard of TikTok. It’s the hottest new viral app made in China, where anyone and everyone can share 15-second video clips with the world. These short-form videos often take the form of lip-syn...
BY: Burhan Choudhry