Cybersecurity performs a vital position in geopolitics — notably throughout occasions of battle. Whereas offensive cyber operations have grow to be almost common, the techniques, timing and targets of menace actors can differ significantly. With Russia’s invasion of Ukraine, for instance, we noticed and shared our report on how cyber techniques can be utilized to help army motion.
In our newest report, Instrument of First Resort: Israel-Hamas Warfare in Cyber, we share our findings on a special tactical method — and the escalation in offensive cyber operations within the wake of the October 7 terrorist assaults. Notably, after the terrorist assaults by Hamas, we noticed the regular stream of cyber operations by Iran and Hezbollah-linked teams grow to be extra targeted, extra concentrated, and — amongst different targets — geared towards undercutting public help for the battle.
Right this moment’s report provides the most recent instance of how cyber operations are instruments of first resort, offering a lower-cost, lower-risk manner for rivals to have interaction in battle, collect data, disrupt day by day life, and form public perceptions — all whereas nonetheless remaining under the road of direct confrontation.
Google has been monitoring and defending customers from cyber menace exercise earlier than, throughout, and after the Hamas terrorist assaults on October 7. Right this moment’s report, based mostly on evaluation from Google’s Risk Evaluation Group (TAG), Mandiant, and Belief & Security groups, encompasses new findings on Iranian-government backed phishing campaigns, hack-and-leak and knowledge operations (IO), in addition to disruptive assaults concentrating on Iran and Hamas-linked cyber operations.


