Cases

Structured case studies of significant cyber operations, analyzed across escalation, infrastructure, and governance dimensions.

30 of 30 cases

Change Healthcare Ransomware Attack

February 2024

Ransomware
DegradationHealthcareCritical Infrastructure

Change Healthcare demonstrated that a single ransomware attack on a dominant healthcare intermediary can cascade into a national healthcare crisis, making the case for treating healthcare claims infrastructure as critical national infrastructure.

ALPHV/BlackCat ransomware-as-a-service group, a Ru…
Unpeace8

Volt Typhoon — US Critical Infrastructure Pre-positioning

2023 – 2024 (disclosed 2024)

Espionage
IntrusionCritical InfrastructureEnergyTelecommunications

Volt Typhoon represents the clearest case of peacetime pre-positioning in adversary critical infrastructure, forcing an urgent policy reckoning on whether such activity constitutes a threat of force and how states should respond to it below the threshold of armed conflict.

Volt Typhoon, attributed by the US, UK, Australia,…
Unpeace6

Microsoft Midnight Blizzard Corporate Intrusion

November 2023 – January 2024 (disclosed January 2024)

Espionage
IntrusionTechnology

Midnight Blizzard showed that state actors will target the internal systems of foundational technology platforms, not just their customers, raising existential questions about supply chain trust and platform security accountability.

Midnight Blizzard (APT29/Cozy Bear), attributed by…
Unpeace5

Taiwan Telecommunications Intrusions

2022 – 2023 (disclosed 2023)

Espionage
IntrusionTelecommunicationsCritical Infrastructure

These intrusions highlight the emerging norm challenge of peacetime pre-positioning: states embedding access in adversary infrastructure for potential future use, blurring the line between espionage and preparation for attack.

Attributed by researchers and the US government to…
Unpeace6

Scattered Spider – MGM Resorts & Caesars Entertainment

September 2023

Ransomware
DegradationMultiple Sectors

MGM/Caesars showed that social engineering by loosely organized criminal groups can paralyze major enterprises as effectively as sophisticated malware, exposing identity and helpdesk processes as critical policy-relevant attack surfaces.

Scattered Spider, a loosely organized English-spea…
Unpeace8

Microsoft Storm-0558 Cloud Email Compromise

May – July 2023

Espionage
DisruptionGovernmentTechnology

Storm-0558 revealed that a single compromised signing key could bypass the security boundaries of the cloud infrastructure underlying most government communications, making cloud identity trust a first-order national security concern.

Storm-0558, assessed by Microsoft and US CISA to b…
Unpeace7

Kyivstar Telecommunications Attack

December 2023

Destructive
DestructionTelecommunicationsCritical Infrastructure

Kyivstar represented the most destructive cyber attack against a telecommunications provider during active conflict, demonstrating ICS-equivalent destructive capability against civilian communication infrastructure and disrupting life-safety warning systems.

Sandworm Team, attributed by Ukraine's SBU to Russ…
Unpeace10

Viasat KA-SAT (AcidRain)

February 2022

Destructive
Strategic ImpactTelecommunicationsDefenseEnergy

Viasat KA-SAT was the clearest example yet of cyber attack as an opening act of war, with cross-border collateral damage that forced NATO and the EU to treat satellite infrastructure as a shared security concern.

Attributed by the EU, UK, US, and allied governmen…
Unpeace10

Costa Rica Government Ransomware Attack

April – May 2022

Ransomware
DegradationGovernmentFinanceHealthcare

Costa Rica showed that ransomware can effectively disable a nation's fiscal and health systems, forcing the first-ever national emergency declaration over a cyber attack and elevating ransomware to a sovereign-level threat.

Conti ransomware group (Russian-speaking criminal …
Unpeace8

Albania Government Cyber Attack

July – September 2022

Destructive
DestructionGovernment

Albania's decision to sever diplomatic ties over a cyber attack — backed by NATO solidarity — set a new precedent for treating destructive cyber operations as grounds for the most serious peacetime diplomatic consequences.

Attributed by Albania, the US, and allied governme…
Unpeace10

Industroyer2 – Ukraine Grid Attack Attempt

April 2022

Sabotage
DisruptionEnergyCritical Infrastructure

Industroyer2 confirmed that grid-targeting ICS malware is now a recurring feature of armed conflict, while its successful mitigation showed that coordinated cyber defense can work under wartime conditions.

Sandworm Team, attributed by Ukraine's CERT-UA and…
Unpeace7

Colonial Pipeline Ransomware Attack

May 2021

Ransomware
DegradationEnergyCritical InfrastructureTransportation

Colonial Pipeline proved that criminal ransomware can trigger national-level infrastructure disruptions, collapsing the boundary between cybercrime and national security and forcing mandatory regulation of pipeline cyber defenses.

DarkSide ransomware-as-a-service group, assessed t…
Unpeace8

Oldsmar Water Treatment Plant Intrusion

February 2021

Sabotage
DisruptionCritical Infrastructure

Oldsmar made water-system cyber risk tangible for policymakers and the public, revealing how small utilities with minimal security budgets can become targets with public-health consequences.

Unknown; initial reports suggested a remote intrud…
Unpeace6

Microsoft Exchange Server Exploitation (Hafnium)

January – March 2021

Espionage
DegradationGovernmentDefenseHealthcare

Hafnium demonstrated how a targeted espionage operation can metastasize into a mass-compromise event affecting tens of thousands, and prompted the widest coalition cyber attribution ever directed at China.

Hafnium, attributed by the US and allied governmen…
Unpeace9

Bangladesh e-Government Portal Intrusions

2021 – 2022

Espionage
DisruptionGovernmentTechnology

The Bangladesh e-government intrusions exemplify a pattern common across rapidly digitizing developing states: the gap between e-government ambition and cybersecurity capability creates systemic risk to citizen data and public trust in digital services.

Unknown; investigations did not produce public att…
Unpeace6

SolarWinds (Sunburst)

March 2020 – December 2020

Espionage
DisruptionGovernmentTechnologyDefense

SolarWinds exposed systemic supply chain risk in government IT and triggered the most sweeping US cybersecurity executive order in a decade, reshaping federal procurement and zero-trust policy.

SVR (Foreign Intelligence Service)
Unpeace8

Iran Nuclear Facilities – Cyber Incidents (2020–2021)

2020 – 2021

Sabotage
DegradationEnergyCritical Infrastructure

These incidents illustrate that cyber-enabled sabotage of nuclear facilities did not end with Stuxnet — the pattern persists, with implications for nonproliferation, deterrence, and the stability of diplomatic negotiations.

Iran publicly attributed several incidents to Isra…
Unpeace8

APT-C-23 / Gaza Cybergang Operations

2018 – 2022 (ongoing, landmark incidents)

Espionage
IntrusionGovernmentDefense

Gaza Cybergang operations demonstrate that non-state armed groups can develop persistent cyber espionage capabilities, complicating the state-centric framework of international cyber norms and raising questions about accountability in asymmetric conflict.

APT-C-23 / Gaza Cybergang / Arid Viper, assessed b…
Unpeace5

Australian Parliament and Political Party Intrusions

January – February 2019

Espionage
IntrusionGovernment

The compromise of a parliament and major parties during an election cycle demonstrated that cyber espionage against democratic institutions is a live risk, even when the collected intelligence is never publicly weaponized.

Described by the Australian government as a 'sophi…
Unpeace5

Thailand Election Infrastructure Targeting

2019

Espionage
IntrusionGovernment

The Thailand election targeting illustrates that electoral cyber interference extends beyond the frequently studied US and European cases, affecting democratically transitional states where institutional resilience is lowest and stakes are highest.

Assessed to be regional state-linked actors; speci…
Unpeace5

Ecuador Citizen Data Exposure

September 2019 (disclosed)

Hybrid
DisruptionGovernmentCritical Infrastructure

The Ecuador data exposure demonstrates that state failure to secure contracted civilian data systems can produce population-scale privacy crises, illustrating data sovereignty as a governance challenge distinct from but parallel to offensive cyber threats.

Non-state negligence: Novaestrat, an Ecuadorian da…
Unpeace6

India–Pakistan Cyber Operations

2016 – 2019 (multiple incidents)

Espionage
IntrusionGovernmentDefenseMedia

India-Pakistan cyber operations represent the most documented case of sustained reciprocal cyber espionage between regional nuclear-armed adversaries, demonstrating that cyber conflict dynamics extend well beyond the US-Russia-China axis.

Multiple groups on both sides; Pakistani-linked gr…
Unpeace5

NotPetya

June 2017

Destructive
Strategic ImpactMultiple SectorsCritical Infrastructure

NotPetya demonstrated that a cyber weapon aimed at one country can inflict billions in collateral damage worldwide, making it a landmark case for debating proportionality, state responsibility, and the limits of deniability in cyber conflict.

GRU (Main Intelligence Directorate)
Unpeace10

WannaCry Ransomware

May 2017

Ransomware
DegradationHealthcareTelecommunicationsTransportation

WannaCry exposed how a leaked intelligence exploit can cascade into a global healthcare crisis, sharpening the policy debate on vulnerability disclosure and the duty to protect civilian systems.

Lazarus Group, attributed by the US, UK, and allie…
Unpeace9

Ukraine Power Grid Attack (2016 / Industroyer)

December 2016

Sabotage
DegradationEnergyCritical Infrastructure

Industroyer represented a generational leap in ICS malware sophistication — a modular, protocol-aware weapon that signaled the industrialization of grid-targeted cyber capabilities.

Sandworm Team, attributed by multiple governments …
Unpeace8

Bangladesh Bank SWIFT Heist

February 2016

Hybrid
DegradationFinance

The Bangladesh Bank heist revealed that the global financial messaging system's security depended on its weakest endpoint, and that state actors would exploit that gap to fund sanctioned programs.

Lazarus Group, attributed by the US DOJ and multip…
Unpeace9

Ukraine Power Grid Attack (2015)

December 2015

Sabotage
DegradationEnergyCritical Infrastructure

Ukraine 2015 was the first confirmed cyber-caused power outage, turning a theoretical risk into an operational reality that reshaped how governments defend energy grids.

Sandworm Team, attributed by multiple governments …
Unpeace8

Sony Pictures Entertainment Hack

November – December 2014

Destructive
DestructionMedia

Sony Pictures showed that a state can weaponize cyber operations to coerce a private company and suppress speech, raising urgent questions about where corporate cybersecurity meets national security.

Lazarus Group, attributed by the US government to …
Unpeace10

Saudi Aramco Shamoon Attack

August 2012

Destructive
DestructionEnergy

Shamoon was the first large-scale destructive attack against a critical energy company, demonstrating that states could use wiper malware to inflict strategic economic signaling without kinetic force.

Widely assessed by US officials and researchers to…
Unpeace9

Stuxnet

circa 2007 – 2010

Sabotage
DestructionEnergyCritical Infrastructure

Stuxnet proved that software alone can destroy physical infrastructure, fundamentally changing how states, lawyers, and strategists think about the threshold between cyber operations and armed conflict.

Widely attributed to a joint US–Israeli operation
Unpeace9