Cyber Warfare Intelligence

When nations fight in the digital domain, it looks like this. Wipers masquerading as ransomware. Pre-positioning that precedes kinetic strikes. Influence operations that shape the narrative. We track all of it.

Active Theatres

Conflicts with significant cyber components being tracked across Signal, Fusion, and V01d.

🇷🇺🇺🇦 Russia — Ukraine

The most documented cyber war in history. Wipers (HermeticWiper, CaddyWiper, AcidRain), power grid attacks (Industroyer2), telecom disruption, and relentless espionage — running alongside kinetic operations since February 2022.

GRU offensive ops coupled with hacktivist fronts (KillNet, NoName057, XakNet) and information warfare targeting Western support.

Sandworm • APT28 • Gamaredon • Turla • Star Blizzard • IT Army of Ukraine

🇮🇷🇮🇱 Iran — Israel

Escalating digital warfare between Iranian proxies and Israeli targets. Wiper attacks, hacktivist fronts (Moses Staff, Agrius), ICS targeting of water systems, and retaliatory operations against Iranian infrastructure.

Extended to regional proxies: Hezbollah, Hamas digital capabilities, and IRGC-sponsored operations against Gulf states.

APT33 • APT34 • MuddyWater • CyberAv3ngers • Moses Staff • Predatory Sparrow

🇨🇳🇹🇼 China — Taiwan / Indo-Pacific

Strategic pre-positioning for potential Taiwan scenario. Volt Typhoon living-off-the-land in US critical infrastructure. Salt Typhoon in telecom for intelligence collection. Espionage surge against defense, semiconductor, and diplomatic targets.

Concurrent campaigns against Philippines, Japan, Australia, India in the broader Indo-Pacific competition.

Volt Typhoon • Salt Typhoon • APT41 • Mustang Panda • APT40 • Flax Typhoon

🇰🇵 North Korea — Global

Revenue generation through cryptocurrency theft funding WMD programs. Destructive capability demonstrated (WannaCry, Sony). Increasing sophistication with supply chain attacks and social engineering of developers.

Lazarus Group • Kimsuky • Andariel • APT43 • TraderTraitor

Cyber Warfare Doctrines We Track

Pre-Positioning

Access established before conflict begins. Living off the land. Undetected for months or years.

Destructive Wipers

Data destruction disguised as ransomware. Deployed at conflict onset for maximum chaos.

Influence Ops

Narrative control, disinformation, hack-and-leak. Shaping public opinion and political will.

Supply Chain

Compromise upstream to reach hundreds of targets. SolarWinds model at national scale.

Hacktivist Fronts

State operations masked as grassroots hacktivism. Plausible deniability for DDoS and leaks.

Kinetic-Cyber Sync

Cyber ops timed with military operations. Comms disruption before ground advance.

Early warning before escalation

V01d Oracle monitors 18 sentiment feeds for conflict escalation signals. Fusion tracks 80+ sources for geopolitical shifts. Signal maps the infrastructure.

Related Intelligence