From hacktivism to development coordination, cyber conflict blind spots bring risks

Virtual Routes is pleased to welcome the 2025-2026 cohort of European Cybersecurity fellows to our community. As part of their application, each fellow wrote an essay on one of three set questions addressing some of the biggest issues facing European cybersecurity policy and practice. Over the next three weeks, we are delighted to introduce this group of talented young cybersecurity professionals with a short series of excerpts from their essays, grouped by question.
In our first installment, Ric Derbyshire of Orange Cyberdefense, Isabella Neumann of the University of Coimbra, and Veronika Datzer from the German Development Cooperation answer the question, What’s the biggest blind spot in our understanding of cyber conflict, and why can’t we afford to ignore it?
Ric Derbyshire, principal security researcher at Orange Cyberdefense and honorary researcher at Imperial College London
Hacktivism, once rooted in symbolic protest and ideological demonstrations, has escalated into a significant threat. Increased targeting of the operational technology controlling and automating physical processes within critical national infrastructure has blurred the lines between independent activism and state-linked operations. This exacerbates the challenges of attributing responsibility to states that tolerate, influence, or support escalatory hacktivist groups. Together, these factors create the biggest blind spot in our understanding of cyber conflict.
Targeting operational technology, particularly within critical national infrastructure, doesn’t just amplify the hacktivist threat, it fundamentally changes the game. Cyberattacks on operational technology bridge the gap between cyber and physical impacts, causing direct societal and economic consequences in ways not previously seen. The explosive cyber-physical impact of Predatory Sparrow’s 2022 attack on Iranian steel manufacturers and the 160 households affected by Cyber Av3ngers’ attack on Irish water treatment facilities epitomise this phenomenon.
Moreover, proliferating offensive cyber tools and large language models (LLMs) have lowered barriers to entry, enhancing attack sophistication and expediting capability development in specialised domains like operational technology.
Beyond its direct risks, escalatory hacktivism challenges accountability as groups increasingly align with state objectives. States can recruit, encourage, or tacitly support hacktivists while maintaining plausible deniability, benefiting from cyber operations without overt responsibility.
The lack of clear attribution weakens accountability, preventing victim states from responding decisively and emboldening further escalation. With no consensus on state responsibility for non-state actors and increased targeting of critical infrastructure, hacktivism is a destabilising force in cyber conflict, exploiting ambiguity to undermine international norms.
Addressing escalatory hacktivism is fraught with challenges, from the complexity of attribution to the absence of clear frameworks for holding states accountable. Strengthening critical national infrastructure resilience and fostering international cooperation are essential but remain difficult amid the escalatory tactics and ambiguous state involvement of hacktivist groups.
However, failing to address this blind spot risks further destabilisation of cyberspace, emboldening actors to escalate their attacks with real-world consequences. As geopolitical conflicts intensify, decisive action is needed to prevent hacktivism from uncontrollable escalation. Ignoring it is not an option.
Isabella Neumann, Ph.D. candidate in international politics and conflict resolution at the University of Coimbra and guest researcher at the University of Oslo’s Centre for European Studies
The European Union continues to grapple with significant challenges in defense coordination, particularly in countering AI-driven cyber threats, data breaches, and disinformation campaigns. A striking example is the AI-generated deepfake campaigns that targeted policymakers and sought to manipulate public opinion during the 2024 European elections. These threats are exacerbated by uneven cyber capabilities, poor interoperability, and limited cross-border resource sharing, all undermining the EU’s overall security.
Yet, cybersecurity presents a dual reality: it is both a significant threat to security and a unique opportunity for greater cooperation. On one hand, cyber threats – such as disinformation campaigns, data breaches, and attacks on critical infrastructure – demand urgent attention. Conversely, cybersecurity offers a promising avenue for deepening civil-military collaboration, representing a key opportunity to strengthen security cooperation.
Unlike conventional defense operations, cyber operations often do not require physical deployments or overt military interventions, making their integration more politically feasible. This unique characteristic enables more potent synergy between civilian agencies – such as law enforcement, intelligence, and critical infrastructure protection – and military cyber defense units. Civilian agencies excel in regulation and analysis, while militaries bring strategic planning and advanced cyber capabilities. Together, they can form a more cohesive and adaptive defense mechanism. In other words, by fostering mutual support and integration between civilian and military sectors, the EU could significantly enhance its ability to respond to complex threats.
However, this potential is hindered by persistent challenges, including a lack of standardized frameworks, conflicting resource distribution, and unclear legal boundaries, leaving
coordination between the civil and military sectors fragmented. While initiatives under the EU’s Permanent Structured Cooperation (PESCO) – such as cyber rapid response teams and the European Military Space Surveillance Awareness Network – have enhanced coordination, more efforts are needed to address remaining gaps and strengthen the EU’s collective defense capabilities.
To fully realize cybersecurity’s potential as a unifying domain, the EU must establish a unified legal framework to clarify the roles of civilian and military actors in cyber defense and address inefficiencies and overlaps. Enhancing civil-military interaction through structured communication, joint training, and shared exercises will build trust, improve cooperation, and ensure more efficient crisis response.
Veronika Datzer, policy advisor on international digital policy at the German Development Cooperation (GIZ)
Cybersecurity in the Global South is national security in Europe, though it is often overlooked in EU policy discussions. Traditionally, EU cyber policy has focused on threats from major geopolitical adversaries such as China, Russia, and Iran. As the EU seeks closer partnerships in Africa, Asia, and Latin America, cyber threats in these regions increasingly pose risks to European stability, particularly through disruptions to supply chains and digital infrastructure.
As internet connectivity expands, cyber risks in emerging economies rise significantly. Research indicates cyber threats in emerging economies are growing faster than in developed nations, impacting vulnerable populations and global trade.
One key issue is weak cyber ecosystems. The African Union’s Malabo Convention provides a cybersecurity framework, but it lacks binding enforcement. African countries may lack technical and organisational measures, with only a few, such as Kenya and Rwanda, serving as regional cybersecurity leaders. Limited information sharing, reliance on pirated software, and AI-driven cybercrime exacerbate these vulnerabilities, making these regions attractive targets for cybercriminals and state-sponsored actors.
Despite significant investments through the EU’s €300 billion Global Gateway initiative, cybersecurity remains largely disconnected from the EU’s broader national security agenda. Better coordination between cyber policy, diplomacy, and development cooperation could strengthen Europe’s security. Strengthening partnerships, improving cyber resilience in the Global South, and fostering knowledge exchange between EU institutions and partner countries are crucial steps to closing cybersecurity blind spots.
Following the policy of integrated security, the efforts of the EU’s development cooperation should be better integrated into its overall policies to prevent potential blind spots. By adequately recognising and responding to cyber threats in partner countries, the EU does not only support its partners in safely closing the digital divides. Europe also closes potential loopholes for cyber threats to permeate and ultimately benefits from stable trade relations.
As the geopolitical landscape shifts, the EU must take a leadership role in global cyber capacity building, particularly in light of reduced US development funding. A unified cybersecurity strategy, integrating diplomacy, security, and development, is essential for Europe’s digital stability in an interconnected world.