Cases
Structured case studies of significant cyber operations, analyzed across escalation, infrastructure, and governance dimensions.
30 of 30 cases
Change Healthcare Ransomware Attack
February 2024
Change Healthcare demonstrated that a single ransomware attack on a dominant healthcare intermediary can cascade into a national healthcare crisis, making the case for treating healthcare claims infrastructure as critical national infrastructure.
Volt Typhoon — US Critical Infrastructure Pre-positioning
2023 – 2024 (disclosed 2024)
Volt Typhoon represents the clearest case of peacetime pre-positioning in adversary critical infrastructure, forcing an urgent policy reckoning on whether such activity constitutes a threat of force and how states should respond to it below the threshold of armed conflict.
Microsoft Midnight Blizzard Corporate Intrusion
November 2023 – January 2024 (disclosed January 2024)
Midnight Blizzard showed that state actors will target the internal systems of foundational technology platforms, not just their customers, raising existential questions about supply chain trust and platform security accountability.
Taiwan Telecommunications Intrusions
2022 – 2023 (disclosed 2023)
These intrusions highlight the emerging norm challenge of peacetime pre-positioning: states embedding access in adversary infrastructure for potential future use, blurring the line between espionage and preparation for attack.
Scattered Spider – MGM Resorts & Caesars Entertainment
September 2023
MGM/Caesars showed that social engineering by loosely organized criminal groups can paralyze major enterprises as effectively as sophisticated malware, exposing identity and helpdesk processes as critical policy-relevant attack surfaces.
Microsoft Storm-0558 Cloud Email Compromise
May – July 2023
Storm-0558 revealed that a single compromised signing key could bypass the security boundaries of the cloud infrastructure underlying most government communications, making cloud identity trust a first-order national security concern.
Kyivstar Telecommunications Attack
December 2023
Kyivstar represented the most destructive cyber attack against a telecommunications provider during active conflict, demonstrating ICS-equivalent destructive capability against civilian communication infrastructure and disrupting life-safety warning systems.
Viasat KA-SAT (AcidRain)
February 2022
Viasat KA-SAT was the clearest example yet of cyber attack as an opening act of war, with cross-border collateral damage that forced NATO and the EU to treat satellite infrastructure as a shared security concern.
Costa Rica Government Ransomware Attack
April – May 2022
Costa Rica showed that ransomware can effectively disable a nation's fiscal and health systems, forcing the first-ever national emergency declaration over a cyber attack and elevating ransomware to a sovereign-level threat.
Albania Government Cyber Attack
July – September 2022
Albania's decision to sever diplomatic ties over a cyber attack — backed by NATO solidarity — set a new precedent for treating destructive cyber operations as grounds for the most serious peacetime diplomatic consequences.
Industroyer2 – Ukraine Grid Attack Attempt
April 2022
Industroyer2 confirmed that grid-targeting ICS malware is now a recurring feature of armed conflict, while its successful mitigation showed that coordinated cyber defense can work under wartime conditions.
Colonial Pipeline Ransomware Attack
May 2021
Colonial Pipeline proved that criminal ransomware can trigger national-level infrastructure disruptions, collapsing the boundary between cybercrime and national security and forcing mandatory regulation of pipeline cyber defenses.
Oldsmar Water Treatment Plant Intrusion
February 2021
Oldsmar made water-system cyber risk tangible for policymakers and the public, revealing how small utilities with minimal security budgets can become targets with public-health consequences.
Microsoft Exchange Server Exploitation (Hafnium)
January – March 2021
Hafnium demonstrated how a targeted espionage operation can metastasize into a mass-compromise event affecting tens of thousands, and prompted the widest coalition cyber attribution ever directed at China.
Bangladesh e-Government Portal Intrusions
2021 – 2022
The Bangladesh e-government intrusions exemplify a pattern common across rapidly digitizing developing states: the gap between e-government ambition and cybersecurity capability creates systemic risk to citizen data and public trust in digital services.
SolarWinds (Sunburst)
March 2020 – December 2020
SolarWinds exposed systemic supply chain risk in government IT and triggered the most sweeping US cybersecurity executive order in a decade, reshaping federal procurement and zero-trust policy.
Iran Nuclear Facilities – Cyber Incidents (2020–2021)
2020 – 2021
These incidents illustrate that cyber-enabled sabotage of nuclear facilities did not end with Stuxnet — the pattern persists, with implications for nonproliferation, deterrence, and the stability of diplomatic negotiations.
APT-C-23 / Gaza Cybergang Operations
2018 – 2022 (ongoing, landmark incidents)
Gaza Cybergang operations demonstrate that non-state armed groups can develop persistent cyber espionage capabilities, complicating the state-centric framework of international cyber norms and raising questions about accountability in asymmetric conflict.
Australian Parliament and Political Party Intrusions
January – February 2019
The compromise of a parliament and major parties during an election cycle demonstrated that cyber espionage against democratic institutions is a live risk, even when the collected intelligence is never publicly weaponized.
Thailand Election Infrastructure Targeting
2019
The Thailand election targeting illustrates that electoral cyber interference extends beyond the frequently studied US and European cases, affecting democratically transitional states where institutional resilience is lowest and stakes are highest.
Ecuador Citizen Data Exposure
September 2019 (disclosed)
The Ecuador data exposure demonstrates that state failure to secure contracted civilian data systems can produce population-scale privacy crises, illustrating data sovereignty as a governance challenge distinct from but parallel to offensive cyber threats.
India–Pakistan Cyber Operations
2016 – 2019 (multiple incidents)
India-Pakistan cyber operations represent the most documented case of sustained reciprocal cyber espionage between regional nuclear-armed adversaries, demonstrating that cyber conflict dynamics extend well beyond the US-Russia-China axis.
NotPetya
June 2017
NotPetya demonstrated that a cyber weapon aimed at one country can inflict billions in collateral damage worldwide, making it a landmark case for debating proportionality, state responsibility, and the limits of deniability in cyber conflict.
WannaCry Ransomware
May 2017
WannaCry exposed how a leaked intelligence exploit can cascade into a global healthcare crisis, sharpening the policy debate on vulnerability disclosure and the duty to protect civilian systems.
Ukraine Power Grid Attack (2016 / Industroyer)
December 2016
Industroyer represented a generational leap in ICS malware sophistication — a modular, protocol-aware weapon that signaled the industrialization of grid-targeted cyber capabilities.
Bangladesh Bank SWIFT Heist
February 2016
The Bangladesh Bank heist revealed that the global financial messaging system's security depended on its weakest endpoint, and that state actors would exploit that gap to fund sanctioned programs.
Ukraine Power Grid Attack (2015)
December 2015
Ukraine 2015 was the first confirmed cyber-caused power outage, turning a theoretical risk into an operational reality that reshaped how governments defend energy grids.
Sony Pictures Entertainment Hack
November – December 2014
Sony Pictures showed that a state can weaponize cyber operations to coerce a private company and suppress speech, raising urgent questions about where corporate cybersecurity meets national security.
Saudi Aramco Shamoon Attack
August 2012
Shamoon was the first large-scale destructive attack against a critical energy company, demonstrating that states could use wiper malware to inflict strategic economic signaling without kinetic force.
Stuxnet
circa 2007 – 2010
Stuxnet proved that software alone can destroy physical infrastructure, fundamentally changing how states, lawyers, and strategists think about the threshold between cyber operations and armed conflict.