An abstract design in the background, and the title of chapter 15 in the foreground. The design consists of alternating dark gray and pale gray regions. Chapter 15. Pandora’s box: The future of Cyberwarfare. Copyright. Yurii Andreichyn. Shutterstock.

CHAPTER 15Pandora’s Box: The Future of Cyberwarfare

© Yurii Andreichyn/Shutterstock.

SINCE 2004’S TITAN RAIN ATTACKS, nation-states have employed cyberattacks more and more as part of the accepted array of weapons. Advanced tools like Flame, Duqu, and Stuxnet are only a few of the weapons in this sometimes quiet battle between attackers and defenders. Nation-state sponsored groups like Sandworm, Hidden Cobra, Stone Panda and other advanced persistent threat (APT) actors have grown in number, capabilities, and complexity. Other attacks, like those against U.S. drones and infrastructure and services in Ukraine have helped demonstrate the risks ...

Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.