Cyber War – The New Reality

Cyber War – The New Reality

by Adam
April 14, 2022

Cyber war is one of the biggest security problems of the 21st century. Cyber warfare is something that has been used in many forms in the past few decades. The one that comes to mind is the Cold War. The use of cyber warfare at that time was known as cyber espionage in a lot of ways. This blog will talk about the different kinds of cyber warfare that are in use today.

Definition of Cyber War

Cyber war or (cyber warfare) is the concept that usually means a series of digital attacks to cause comparable harm to actual warfare, infrastructure, and critical systems. Cyber attacks can also cause physical damage. 

There can be a legitimate difference between cyber war and cybercrime: cyber war can be defined as a threat to national security, while cybercrime can be any other criminal activity in cyberspace.

Types of Cyber War attacks

The goal of cyberwar is to weaken or destroy the nation. To achieve that the series of cyberattacks target the objects of national interest. Here are the most used types of cyberwar attacks.


Attacking critical infrastructure, including transportation systems, banking systems, power and water supplies systems, and hospitals are parts of destabilization cyber attacks.


Sabotage attacks can take down official government digital systems and means of communication, like military databases, civilian databases, or financial databases. 


Cyber espionage refers to the monitoring of other countries’ actions in order to steal sensitive data and information. It can be used to build intelligence for both physical and cyber wars. 

Data theft

It refers to stealing data that can be used for intelligence, for political destabilization, or sold. 


Cyber propaganda has a goal to control the minds of citizens. It can be used to expose embarrassing information and spread lies so people lose trust and take a side of an enemy. 

Economic attacks

Economic cyber attacks target computer networks of specific economic establishments like national banks, payment systems, stock markets to steal money or block citizens from accessing it. 

Denial-of-service attacks

It prevents legitimate users from accessing a website. It can disrupt critical operations and systems. 

Surprise attacks

The idea of surprise attacks includes a massive attack against an enemy that is not expected, enabling the attacker to weaken the enemy’s defense. It can be a strategy to prepare the context for hybrid warfare.

The kinds of cyber weapons used in cyber war are the following:

    • Viruses
    • Computer worms
    • Phishing
    • Malware
    • Spyware
    • Ransomware

The understanding that the war can move primarily online has been around for the last couple of decades. The latest events in Ukraine led to cyber war becoming the new reality. Before February 24th, 2022 a series of cyber attacks destabilized Ukrainian government websites, sent the spread of malicious emails to Ukrainian military officials, and malware attacked the Ukrainian government and private sectors. Over 311,000 people joined a group called “IT Army of Ukraine” until now.

Some cyber attacks are meant to be visible, but some are not. Some attacks are meant to destabilize, but some are meant to be a distraction. It is hard to keep track of who conducts an attack against who. One of the good examples is the engagement of the Anonymous collective in the cyber war between Russia and Ukraine. Cyber becomes a tool for 

                                            “gray-zone conflict, that area between peace and war, where you are trying to hit back at the other party, but you don’t want to escalate this to an actual kinetic conflict”. 

We can see that cyber war is going to be a tool for conflict. This means that we need to be prepared for cyber war, just as we are prepared for other types of war.

Stay updated with MONKPHISH and subscribe!

Related Stories

March 30, 2023

MONKPHISH – Your Key to Better CyberSecurity

The majority of the market's current cyber security offerings provide simulations, libraries, and training that is pre-formatted, which can create issues. Cyber security needs to be constantly updated and customized to be effective, so these pre-formatted offerings may not provide the best protection. Learn more.

December 22, 2022

Web3 – A Cybersecurity Threat?

Does blockchain authentication make cyber security safer? Is Web3 security sufficient? This blog will explore the impact of Web3 on cybersecurity and the latest trends in cyber security.

January 12, 2023

Cyber Security for Healthcare Facilities

Hospitals and other medical facilities are under threat of cyber attacks. This blog will explore the cyber security challenges the medical sector is facing and what steps need to be taken to protect patients' safety.