Pages
  • First Page
  • National & Int’l
  • Iranica
  • last page
Number Eight Thousand Nine Hundred and Seventy Three - 14 March 2026
Iran Daily - Number Eight Thousand Nine Hundred and Seventy Three - 14 March 2026 - Page 1

Looming cyber warfare

By Sajad Abedi

Political affairs expert

In recent decades, cyber warfare has emerged as one of the most critical global security challenges. However, this kind of war is no longer confined to the boundaries of simple, classic cyberattacks. With technological advancements and the vast expansion of the internet, “Cyber Warfare 1+” has transformed into a more advanced and sophisticated form. This evolution, known as Advanced Cyber Warfare (ACW), reflects a fundamental shift in the structures, objectives, and tools utilized within cyberspace.
 
1. Concept of ACW
ACW refers to the strategic use of cutting-edge technologies, artificial intelligence (AI), robotics, and big data analytics within the cyber domain. This generation of warfare is no longer limited to attacking computer systems or information networks; it is gravitating toward strikes that exploit automated systems, the Internet of Things (IoT), and even the smart infrastructures of cities and industries.
For instance, an advanced cyberattack could leverage AI to identify user behavioral patterns and then employ “intelligent phishing” to extract sensitive data. Similarly, an assault on industrial control systems could lead to disruptions in energy production or water distribution.
 
2. Accelerants of cyber warfare evolution
Several key factors play a role in the advancement of cyber warfare:
Technological progress: AI, machine learning, and big data tools have enabled the execution of complex attacks.
Expansion of IoT: The increasing number of internet-connected devices has created more vulnerabilities within systems.
Growing digital dependency: From banks to transportation and medical systems, everything now depends on the digital realm.
Shift in attack objectives: Today, the goal is often not just data theft, but the destruction of systems, economic disruption, and even threats to national security.
 
3. Real-world examples of ACW
A prominent example is Stuxnet. Discovered in 2010, this virus was specifically designed to sabotage nuclear process control systems in Iran. Stuxnet exploited several security flaws in Windows and industrial control systems to disrupt their operations.Another example is the evolution of Ransomware, which is now conducted through sophisticated phishing and network penetration aided by AI. For instance, the WannaCry virus in 2017 utilized a Windows security vulnerability to spread globally, affecting over 200 countries.
Page 2

Search
Date archive