cyberattacks by country

{{Short description|none}}

{{more citations needed|section, except for one footnote, | date= July 2013}}

A cyberattack is any unauthorized effort against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.

Italy

= South Tyrol =

In 2025, South Tyrol, Italy, experienced a significant system failure, which was later confirmed to be the result of a cyberattack. The attack targeted critical infrastructure, including emergency communication systems, leading to major disruptions in emergency response operations. Hackers issued a ransom demand following the attack. Local authorities quickly acknowledged the breach and began efforts to restore affected systems. The cause of the attack and the perpetrators are under investigation by relevant authorities.https://www.suedtirolnews.it/chronik/systemausfall-in-zentralen Source

Azerbaijan

Hackers from Azerbaijan and Armenia have actively participated in cyber warfare as part of the Nagorno-Karabakh conflict cyber warfare over the disputed region of Nagorno-Karabakh, with Azerbaijani hackers targeting Armenian websites and posting Ilham Aliyev's statements.{{Cite news |url=https://www.azerbaycan24.com/en/azerbaijani-hackers-broke-into-over-90-armenian-websites-video/ |title=Azerbaijani hackers broke into over 90 armenian websites – VIDEO |website=Azerbaycan24 |date=27 September 2020 |language=en }}{{cite web |last1=Giles |first1=Christopher |title=Nagorno-Karabakh: The Armenian-Azeri 'information wars' |url=https://www.bbc.com/news/world-europe-54614392 |publisher=BBC |date=October 26, 2020}}

Canada

"Chinese state-sponsored actor" attacked a research facility in Canada in 2011. Unknown hackers attacked Canada's foreign ministry in 2022.{{Cite news|agency=Reuters|date=2022-01-24|title=Canada's foreign ministry hacked, services hit|language=en|work=Reuters|url=https://www.reuters.com/technology/canadas-foreign-ministry-hacked-services-hit-2022-01-24/|access-date=2022-01-25}}

China

{{Main|Cyberwarfare and China}}

China's People's Liberation Army (PLA) has developed a strategy called "Integrated Network Electronic Warfare" which guides computer network operations and cyber warfare tools. This strategy helps link together network warfare tools and electronic warfare weapons against an opponent's information systems during the conflict. They believe the fundamentals for achieving success is about seizing control of an opponent's information flow and establishing information dominance. The Science of Military and The Science of Campaigns both identify enemy logistics systems networks as the highest priority for cyberattacks and states that cyber warfare must mark the start of a campaign, used properly, can enable overall operational success.Krekel, Bryan. People's Republic of China. The US-China Economic and Security Review Commission.Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Virginia: Northrop Grumman, 2009. Web. Focusing on attacking the opponent's infrastructure to disrupt transmissions and processes of information that dictate decision-making operations, the PLA would secure cyber dominance over their adversary. The predominant techniques that would be utilized during a conflict to gain the upper hand are as follows, the PLA would strike with electronic jammers, electronic deception, and suppression techniques to interrupt the transfer processes of information. They would launch virus attacks or hacking techniques to sabotage information processes, all in the hopes of destroying enemy information platforms and facilities. The PLA's Science of Campaigns noted that one role for cyber warfare is to create windows of opportunity for other forces to operate without detection or with a lowered risk of counterattack by exploiting the enemy's periods of "blindness", "deafness" or "paralysis" created by cyberattacks. That is one of the main focal points of cyber warfare, to be able to weaken your enemy to the full extent possible so that your physical offensive will have a higher percentage of success.

The PLA conducts regular training exercises in a variety of environments emphasizing the use of cyber warfare tactics and techniques in countering such tactics if it is employed against them. Faculty research has been focusing on designs for rootkit usage and detection for their Kylin Operating System which helps to further train these individuals' cyber warfare techniques. China perceives cyber warfare as a deterrent to nuclear weapons, possessing the ability for greater precision, leaving fewer casualties, and allowing for long-ranged attacks.

On March 2, 2021, Microsoft released an emergency security update to patch four security vulnerabilities that had been used by Hafnium, a Chinese nation-state-sponsored hacking group that had compromised at least 30,000 public and private Microsoft exchange servers.{{cite news |last1=Krebs |first1=Brian |title=At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft's Email Software |url=https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/ |access-date=14 April 2021 |publisher=Krebs on Security |date=5 March 2021}}

In September 2022, China's National Computer Virus Emergency Response Center (CVERC) accused the NSA of carrying out a series of cyberattacks against Northwestern Polytechnical University as part of tens of thousands of “malicious network attacks” that it said the agency conducted against Chinese targets.{{cite news|title=Cyberattack on Xi'an university traced to NSA in US|url=https://global.chinadaily.com.cn/a/202209/05/WS6315a25fa310fd2b29e75ffa.html |work=China daily |date= 2022-09-05|accessdate= 2025-04-03}}{{cite web |title=China Accuses NSA of Northwestern Polytechnical University Cyber-Attack|url=https://australiancybersecuritymagazine.com.au/china-accuses-nsa-of-northwestern-polytechnical-university-cyber-attack/ |work=Australian Cyber Security Magazine |date= 2022-09-09|accessdate=2025-04-03}} The United States has said the university has conducted extensive military research and its department of Commerce has put the university on its entity list.

In April 2025, CVERC said the information systems for the 2025 Asian Winter Games which it hosted were subjected to more than two hundred thousand foreign cyberattacks and accused the United States of being behind most of the attacks.{{cite news|title=Cyberattacks on Winter Asian Games systems traced to US, report says|url=https://global.chinadaily.com.cn/a/202504/03/WS67ee17d5a3104d9fd381d806.html |work=China daily |date= 2025-04-03}} CVERC said that the attacks did not cause significant damage, and condemned cyberattacks targeting major international events.{{cite web |title=“2025年哈尔滨第九届亚冬会”赛事信息系统及黑龙江省内关键信息基础设施遭境外网络攻击情况监测分析报告|lang=ZH |url=https://www.cverc.org.cn/head/zhaiyao/news20250403-haerbinyadonghui.htm/ |work=CVERC |date= 2025-04-03}} The allegation were made in the midst of a trade war between the US and China and after the US accused Beijing of carrying out a cyberespionage campaign that targeted US-based critics of Beijing.{{cite news |last1=Ali |first1=Ramisha |title=China accuses US of cyberattack during Asian Winter Games |url=https://www.dw.com/en/china-accuses-us-of-cyberattack-during-asian-winter-games/a-72246386 |publisher=DW |date=April 15, 2025}}

Estonia

{{main|2007 cyberattacks on Estonia}}

The 2007 cyberattacks on Estonia were a series of cyberattacks that began on 27 April 2007 and targeted websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers, and broadcasters, amid the country's disagreement with Russia about the relocation of the Bronze Soldier of Tallinn, an elaborate Soviet-era grave marker, as well as war graves in Tallinn.{{cite news |work=The Guardian |date=17 May 2007 |url=https://www.theguardian.com/russia/article/0,,2081438,00.html |title=Russia accused of unleashing cyberwar to disable Estonia |author=Ian Traynor |url-status=live |archive-url= https://web.archive.org/web/20130831075221/http://www.theguardian.com/world/2007/may/17/topstories3.russia |archive-date= Aug 31, 2013 }}{{cite news |title=War in the fifth domain. Are the mouse and keyboard the new weapons of conflict? |url=http://www.economist.com/node/16478792 |url-access=subscription |quote=Important thinking about the tactical and legal concepts of cyber-warfare is taking place in a former Soviet barracks in Estonia, now home to NATO's "centre of excellence" for cyber-defence. It was established in response to what has become known as "Web War 1", a concerted denial-of-service attack on Estonian government, media and bank web servers that was precipitated by the decision to move a Soviet-era war memorial in central Tallinn in 2007. |newspaper=The Economist |date= 1 July 2010|access-date=2 July 2010 |url-status=live |archive-url= https://web.archive.org/web/20100705121639/http://www.economist.com/node/16478792 |archive-date= Jul 5, 2010 }} The attacks triggered a number of military organizations around the world to reconsider the importance of network security to modern military doctrine. The direct result of the cyberattacks was the creation of the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn.

Ethiopia

In an extension of a bilateral dispute between Ethiopia and Egypt over the Grand Ethiopian Renaissance Dam, Ethiopian government websites have been hacked by the Egypt-based hackers in June 2020.{{cite news |title=An Egyptian cyber attack on Ethiopia by hackers is the latest strike over the Grand Dam |url=https://qz.com/africa/1874343/egypt-cyber-attack-on-ethiopia-is-strike-over-the-grand-dam/ |work=Quartz |date=27 June 2020 |first1=Zecharias |last1=Zelalem |url-status=live |archive-url= https://web.archive.org/web/20240407204259/https://qz.com/africa/1874343/egypt-cyber-attack-on-ethiopia-is-strike-over-the-grand-dam |archive-date= Apr 7, 2024 }}

India and Pakistan

{{Main|India–Pakistan relations}}

There were two such instances between India and Pakistan that involved cyberspace conflicts, starting in the 1990s. Earlier cyber attacks came to be known as early as 1999.Prichard, Janet, and Laurie MacDonald. "Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks." Journal of Information Technology Education. 3. (2004): n. page. Web. Since then, India and Pakistan were engaged in a long-term dispute over Kashmir which moved into cyberspace. Historical accounts indicated that each country's hackers have been repeatedly involved in attacking each other's computing database system. The number of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by the end of August 2001. In 2010, Indian hackers laid a cyber attack at least 36 government database websites going by the name "Indian Cyber Army".{{cite news|title=36 government sites hacked by 'Indian Cyber Army' |url=http://tribune.com.pk/story/83967/36-government-websites-hacked-by-indian-cyber-army/|access-date=8 June 2013|newspaper=Express Tribune|date=30 November 2010}} In 2013, Indian hackers hacked the official website of Election Commission of Pakistan in an attempt to retrieve sensitive database information. In retaliation, Pakistani hackers, calling themselves "True Cyber Army" hacked and defaced ~1,059 websites of Indian election bodies.{{cite news|first=Waseem|last=Abbasi|title=Pakistani hackers defaced over 1,000 Indian websites|url=http://www.thenews.com.pk/Todays-News-13-22095-Pakistani-hackers-defaced-over-1000-Indian-websites|access-date=8 June 2013|newspaper=The News International |date=6 April 2013|archive-date=23 July 2015|archive-url=https://web.archive.org/web/20150723222623/http://www.thenews.com.pk/Todays-News-13-22095-Pakistani-hackers-defaced-over-1000-Indian-websites|url-status=dead}}

In 2013, India's Ministry of Electronics and Information Technology (MeitY) which was then known as Department of Electronics and Information Technology (DeitY), unveiled a cybersecurity policy framework called National Cyber Security Policy 2013 which officially came into effect on July 1, 2013.{{Cite web|title=National Cyber Security Policy-2013 |url=https://www.meity.gov.in/content/national-cyber-security-policy-2013-1|access-date=2020-08-19|website=Ministry of Electronics and Information Technology, Government of India }}

According to the media, Pakistan's has been working on effective cyber security systems, in a program called the "Cyber Secure Pakistan" (CSP).{{cite news|title=Cyber Secure Pakistan' initiative launched|url=http://www.thenews.com.pk/Todays-News-6-172840-Cyber-Secure-Pakistan-initiative-launched|access-date=10 June 2013|newspaper=The News International |date=22 April 2013|archive-date=23 June 2013|archive-url=https://web.archive.org/web/20130623033931/http://www.thenews.com.pk/Todays-News-6-172840-Cyber-Secure-Pakistan-initiative-launched|url-status=dead}} The program was launched in April 2013 by the Pakistan Information Security Association and the program has expanded to country's universities.

In 2020, according to the Media reports, Pakistan Army confirms the series of Cyber Attacks that has been identified on Pakistani Government and private websites by the Indian Intelligence. ISPR also advised the government and private institutions to enhance cyber security measures.{{Cite web|date=2020-08-12|title=Major cyber attack by Indian intelligence identified: ISPR|url=http://tribune.com.pk/story/2259193/major-cyber-attack-by-indian-intelligence-identified-ispr|access-date=2020-09-26|website=The Express Tribune|language=en}}

Indonesia

Indonesia said it has started to recover data that had been encrypted in a major ransomware attack in June 2024 which affected more than 160 government agencies.

The attackers identified as Brain Cipher asked for $8 million in ransom to unlock the data before later apologising and releasing the decryption key for free, according to Singapore-based cybersecurity firm StealthMole.https://www.reuters.com/technology/cybersecurity/indonesia-says-it-has-begun-recovering-data-after-major-ransomware-attack-2024-07-12/

Iran

On 8 February 2020, the telecommunication network of Iran witnessed extensive disruptions at 11:44 a.m. local time, which lasted for about an hour. The Ministry of Information and Communications Technology of Iran confirmed it as a Distributed Denial of Service attack. The Iranian authorities activated the "Digital Fortress" cyber-defense mechanism to repel. Also known as DZHAFA, it led to a drop of 75 percent in the national internet connectivity.{{cite web|url=https://financialtribune.com/articles/sci-tech/102062/iran-repels-cyberattack-targeting-internet-backbone|title= Iran Repels Cyber Attack Targeting Internet Backbone |access-date=8 February 2020|website=Financial Tribune|date= 8 February 2020 }}

On the noon of 26 October 2021, a cyberattack caused all 4,300 fuel stations in Iran to disrupt and disable government-issued cards for buying subsidized fuel. This cyber attack also caused digital billboards to display messages against the Iranian government.{{Cite news|title=در حمله سایبری همه ۴۳۰۰ پمپ بنزین در ایران "دچار اختلال شدند"|url=https://www.radiofarda.com/a/iran-cyber-attack-gas-station/31531238.html|access-date=2021-11-02|website=رادیو فردا|date=27 October 2021 |language=fa |last1=فردا |first1=رادیو }}{{Cite news|agency=Associated Press|date=2021-10-27|title=A cyberattack paralyzed every gas station in Iran|language=en|work=NPR|url=https://www.npr.org/2021/10/27/1049566231/irans-president-says-cyberattack-was-meant-to-create-disorder-at-gas-pumps|access-date=2021-11-02}}

Ireland

{{Main|Health Service Executive ransomware attack}}

On 14 May 2021, the Health Service Executive (HSE) of Ireland suffered a major ransomware cyber attack which caused all of its IT systems nationwide to be shut down.{{cite news |title=Some health service disruption after HSE cyber attack |url=https://www.rte.ie/news/health/2021/0514/1221519-hospital-it-problem/ |publisher=RTÉ News and Current Affairs |access-date=14 May 2021}}{{cite news |title=Irish health service hit by 'very sophisticated' ransomware attack |url=https://www.reuters.com/technology/irish-health-service-hit-by-ransomware-attack-vaccine-rollout-unaffected-2021-05-14/ |publisher=Reuters |access-date=14 May 2021}}{{cite news |title=Irish health service hit by cyber attack |url=https://www.bbc.co.uk/news/world-europe-57111615 |publisher=BBC News |access-date=14 May 2021}}{{cite news |title=Ransomware attack disrupts Irish health services |url=https://www.theguardian.com/world/2021/may/14/ransomware-attack-disrupts-irish-health-services |work=The Guardian |access-date=14 May 2021}}

It was the most significant cybercrime attack on an Irish state agency and the largest known attack against a health service computer system.{{cite news|date=15 May 2021|title=Cyber attack 'most significant on Irish state'|work=BBC News|url=https://www.bbc.com/news/world-europe-57111615|access-date=18 May 2021}}{{cite news|title=Wizard Spider profile: Suspected gang behind HSE attack is part of world's first cyber-cartel|url=https://www.irishtimes.com/news/crime-and-law/wizard-spider-profile-suspected-gang-behind-hse-attack-is-part-of-world-s-first-cyber-cartel-1.4568806|last=Lally|first=Conor|date=18 May 2021|access-date=5 September 2021|publisher=The Irish Times}} The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Russia.{{Cite news|last=Reynolds|first=Paul|date=18 May 2021|title=Wizard spider: Who are they and how do they operate?|publisher=RTÉ News and Current Affairs|url=https://www.rte.ie/news/crime/2021/0518/1222349-ransomware-crime-group/|access-date=18 May 2021}}{{Cite news|last1=Gallagher|first1=Conor|last2=McQuinn|first2=Cormac|title=Dark web 'dump sites' being monitored for HSE data after hack|url=https://www.irishtimes.com/news/crime-and-law/dark-web-dump-sites-being-monitored-for-hse-data-after-hack-1.4567731|access-date=18 May 2021|publisher=The Irish Times|language=en}}{{Cite news|last1=Horgan-Jones|first1=Jack|last2=Lally|first2=Conor|title=Scale of damage from cyberattack on HSE systems will not be known for days|url=https://www.irishtimes.com/news/health/scale-of-damage-from-cyberattack-on-hse-systems-will-not-be-known-for-days-1.4565621|access-date=2021-05-15|publisher=The Irish Times|language=en}} The same group is believed to have attacked Ireland's Department of Health with a similar cyber attack.

Israel

In April 2020, there were attempts to hack into Israel's water infrastructure of the Sharon central region by Iran, which was thwarted by Israeli cyber defenses. The cyberattack intended to introduce dangerous levels of chlorine into the Israeli water supply.{{cite web|url=https://www.timesofisrael.com/iran-cyberattack-on-israels-water-supply-could-have-sickened-hundreds-report/|title=Iran cyberattack on Israel's water supply could have sickened hundreds – report|website=The Times of Israel|date=1 June 2020}}

North Korea

In February 2024 UN sanctions monitors were investigating claims that dozens of cyber attacks that North Korea is suspected of carrying out has raised around $3 billion which is being used to fund and develop its nuclear weapons program.{{Cite news |agency=Reuters |date=2024-02-08 |title=Cyber-attacks by North Korea raked in $3bn to build nuclear weapons, UN monitors suspect |url=https://www.theguardian.com/world/2024/feb/08/cyber-attacks-by-north-korea-raked-in-3bn-to-build-nuclear-weapons-un-monitors-suspect |access-date=2024-02-08 |work=The Guardian |language=en-GB |issn=0261-3077}}{{Further|Sony Pictures hack}}

Norway

In August 2020 the Norwegian parliament Stortinget suffered a cyberattack on the email system belonging to several officials. In December 2020, the Norwegian Police Security Service said the likely perpetrators were the Russian cyber espionage group Fancy Bear.{{Cite news|last=|first=|date=8 December 2020|title=Norway accuses Russian hackers of parliament attack|url=https://www.thelocal.no/20201208/norway-accuses-russian-hackers-of-parliament-attack|url-status=|archive-url=|archive-date=|access-date=2020-12-21|newspaper=The Local Norway}}{{Subscription required}}

Russia

During the 2018 FIFA World Cup, Russia countered and stopped around 25 million cyber-attacks on IT Infrastructure.{{cite news |title=Putin says Russia targeted by almost 25 million cyber-attacks during World Cup |url=https://www.telegraph.co.uk/news/2018/07/16/putin-says-russia-targeted-almost-25-million-cyber-attacks-world/ |archive-url=https://ghostarchive.org/archive/20220112/https://www.telegraph.co.uk/news/2018/07/16/putin-says-russia-targeted-almost-25-million-cyber-attacks-world/ |archive-date=12 January 2022 |url-access=subscription |url-status=live |work=The Telegraph |date=16 July 2018}}{{cbignore}}{{cite web |title=Russia Fends Off 25 Million Cyber-Attacks During World Cup |url=https://www.infosecurity-magazine.com/news/russia-fends-off-25-million-world/ |website=Infosecurity Magazine |date=16 July 2018}}

In June 2019, Russia has conceded that it is "possible" its electrical grid is under cyber attack by the United States.{{cite news |title=US and Russia clash over power grid 'hack attacks |url=https://www.bbc.com/news/technology-48675203 |work=BBC News |date=18 June 2019}} The New York Times reported that American hackers from the United States Cyber Command planted malware potentially capable of disrupting the Russian electrical grid.{{cite magazine |title=How Not To Prevent a Cyberwar With Russia |url=https://www.wired.com/story/russia-cyberwar-escalation-power-grid/ |magazine=Wired |date=18 June 2019}}

On 19 October 2020, the US justice department charged six Russian military officers of a worldwide hacking campaign, which attacked targets like French election, the 2018 Winter Olympic Games opening ceremony, US businesses and Ukraine's electricity grid. The campaign was believed to have cost billions of dollars for the mass disruption it caused.{{cite news|url= https://www.nytimes.com/2020/10/19/us/politics/russian-intelligence-cyberattacks.html |title= U.S. Charges Russian Intelligence Officers in Major Cyberattacks |access-date= 19 October 2020 |website= The New York Times|date= 19 October 2020 |last1= Schmidt |first1= Michael S. }}

Ukraine

{{Main|2017 cyberattacks on Ukraine}}

A series of powerful cyber attacks began 27 June 2017, that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. In January 2022, Microsoft disclosed activity of a ransomware and DoS attack on various government agencies and organizations.{{Cite web|date=2022-01-16|title=Destructive malware targeting Ukrainian organizations|url=https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/|access-date=2022-01-17|website=Microsoft Security Blog|language=en-US}}{{Cite web|date=2022-01-16|title=Malware attacks targeting Ukraine government|url=https://blogs.microsoft.com/on-the-issues/2022/01/15/mstic-malware-cyberattacks-ukraine-government/|access-date=2022-01-17|website=Microsoft On the Issues|language=en-US}}

United Arab Emirates

In 2019, Reuters reported that United Arab Emirates launched a series of cyberattacks on its political opponents, journalists, and human rights activists under Project Raven, on an espionage platform namely Karma. The team included ex-US intelligence agents. Project Raven commenced in 2009 and was planned to be continued for the coming ten years.

United Arab Emirates, used and asked for help from couple of countries providing their best calibres to overcome this crisis, and to confine the damage and consequences upon Project Raven, and indeed big names did participate to help like the American master, Graham Dexter, and the Egyptian phenomenal name in cybersecurity, Elhamy El Sebaey.{{cite news|url=https://www.reuters.com/investigates/special-report/usa-spying-raven/|title=Inside the UAE's secret hacking team of American mercenaries|work=Reuters|access-date=30 January 2019}}

United States of America

In 2015. the Office of Personnel Management (OPM) and the Interior Department were hacked, resulting in data breaches of government and security records. Numerous reports claim that Chinese hackers conducted these attacks, as the Chinese government has used hackers to attack and target U.S. military networks the year prior.{{Cite news |last=Rushe |first=Dominic |date=2015-06-05 |title=OPM hack: China blamed for massive breach of US government data |url=https://www.theguardian.com/technology/2015/jun/04/us-government-massive-data-breach-employee-records-security-clearances |access-date=2024-04-24 |work=The Guardian |language=en-GB |issn=0261-3077}}{{Cite web |last=Menn |first=Joseph |date=June 19, 2015 |title=U.S. employee data breach tied to Chinese intelligence: sources |url=https://www.reuters.com/article/idUSKBN0OZ20Z/ |website=Reuters}} In 2024, cyber-tensions remain between the United States and the People's Republic of China, as accusations of hacking the U.S. government continue to arise. Reuters claims that cyber-espionage operations have been attacking the U.S. infrastructure, including the electric grid, water plants, oil and gas pipelines, and transportation, placing an increased focus on civilian attacks. Government officials have expressed concern about these attacks, relating them to bombings that have no economic or political gain whatsoever.{{Cite web |last1=Martina |first1=Michael |last2=Zengerle |first2=Patricia |last3=Goudsward |first3=Andrew |date=January 31, 2024 |title=US officials deliver warning that Chinese hackers are targeting infrastructure |url=https://www.reuters.com/technology/cybersecurity/chinese-hackers-are-targeting-us-infrastructure-fbi-chief-testify-2024-01-31/ |access-date=April 23, 2024 |website=Reuters}} Though neither of the claims are confirmed by the Chinese government, U.S. officials continue to emphasize Chinese involvement in cyberattacks against their country.

During the 2016 presidential election, an indictment of 12 Russian military intelligence officers revealed that Russian hackers conducted an attack against the Clinton administration that targeted staff and campaign email addresses, following her opponent's, Donald Trump's, discernment of missing emails from Democratic servers on the same day as the attack. Robert S. Mueller, a special counsel of the United States government, claimed that the Russian government was also guilty to laundering money and stealing voter information. Furthermore, he investigated a possible conspiracy between the Russian government and Trump's possible attempt to sway the 2016 election.{{Cite news |last1=Nakashima |first1=Ellen |last2=Harris |first2=Shane |date=July 13, 2018 |title=How the Russians Hacked the DNC and passed its emails to WikiLeaks |url=https://www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html |access-date=April 23, 2024 |newspaper=The Washington Post}}

In 2023, the United States Government was able to identify and stop an organized attack on numerous computers throughout the states. This attack was taken out by Volt Typhoon, a Chinese hacking group who used its ability to access computers with lowered cyber security to try and infiltrate different American systems.{{Cite web |date=2024-01-31 |title=Office of Public Affairs {{!}} U.S. Government Disrupts Botnet People's Republic of China Used to Conceal Hacking of Critical Infrastructure {{!}} United States Department of Justice |url=https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical |access-date=2024-04-28 |website=www.justice.gov |language=en}} In April 2024, FBI Director Christopher Wray said Volt Typhoon's plan is to target the US civilian infrastructure through different cyber attacks in the future.{{Cite web |last=Bing |first=Christopher |date=April 18, 2024 |editor-last=Chang |editor-first=Richard |title=FBI says Chinese hackers preparing to attack US infrastructure |url=https://www.reuters.com/technology/cybersecurity/fbi-says-chinese-hackers-preparing-attack-us-infrastructure-2024-04-18/ |website=Reuters}} Wray warned that China is developing the "ability to physically wreak havoc on our critical infrastructure at a time of its choosing."

In September 2024, under a court order, the FBI took control of a network of hundreds of thousands of internet routers and other devices that had been hacked by Chinese government-linked hackers who were using the massive web of hacked devices (known as botnet) to pose a threat to critical infrastructure both in the United States and abroad.{{Cite news |last=Lyngaas |first=Sean |date=September 18, 2024 |title=FBI says it has disrupted major Chinese hacking operation that threatened US critical infrastructure |url=https://www.cnn.com/2024/09/18/politics/fbi-chinese-hacking/index.html |access-date=October 14, 2024 |work=CNN}}

References