1. Why This Threat Exists
Cyber operations are cheaper and less visible than most other forms of statecraft. Intelligence collection, pre-positioning, influence operations, and infrastructure disruption can all happen through network intrusions that leave no physical trace. Public and private sector organizations get targeted based on what they know, who they connect to, and what they operate — not just their size.
These intrusions don't always start with sophisticated malware. Many begin with phishing emails, credential stuffing against VPN portals, or exploitation of known vulnerabilities on edge devices. What distinguishes them is patience, targeting quality, and discipline about staying quiet after initial access.
Critical infrastructure operators, telecom providers, managed service providers, research institutions, and supply chain vendors often become targets not because of their own data, but because of who they have trusted access to.