Trump 2.0: Cyberwarfare To Reach New Heights

Trump 2.0: Cyberwarfare To Reach New Heights


President-elect Donald Trump will enter the White House on January 20th, 2025, with the Republican Party now holding a majority in the upper and lower chambers of the United States Congress (the Senate and the House of Representatives). 

However, the position of the Republican Party regarding ongoing interstate conflicts will almost certainly pose serious challenges for global cybersecurity throughout 2025 with regional instability resulting in the realignment of diplomatic relations and shifts in world power dynamics.

This will likely involve nation-states leveraging their cyber programmes to attack critical sectors in the US to gain international advantage. As a result, the impact will also likely be felt across global cyber space, meaning that both public and private sector organisations must prepare to prioritise risk management strategies.

Today, cyber risk should be taken as seriously as economic risk.  

Iran Faces A New Financial Crisis

Iran will harness its cyber capabilities to retaliate against expected economic sanctions to be enforced under the new Republican Party government. Tehran will be forced to manage escalation risks in the Middle East whilst conducting aggressive network operations against critical sectors in the US as the regime’s reputation and regional stability are at stake.

Espionage sponsored by the regime will likely seek to collect intelligence on US foreign policy regarding the Joint Comprehensive Plan of Action (Iran’s nuclear deal) as well as to gauge the position of the US government’s support of Israel against Iran’s Axis of Resistance proxies throughout the Middle East.

The Western financial sector will likely be at a heightened risk from this cyber targeting, with Iranian threat actors pivoting to financially motivated cyber-attacks.

This is partly because  President-elect Trump is likely to enforce further sanctions against Iran, mirroring the ‘maximum pressure’ policy’ that was applied during the previous Republican Party administration.

Trump Rallies A Cabinet Of China Hawks To Combat Beijing

President-elect Trump has established a cabinet consisting of China hawks that will likely result in increased tensions between Beijing and Washington for years to come. In 2025, this will likely transition into cyber space by Chinese espionage actors seeking to collect intelligence on the diplomatic relations between the US and Taiwan as well as to gauge the position of the Republican Party’s intentions of pushing back against China’s territorial claims in the South China Sea. 

Further, with the imminent deadline of the ‘Made in China 2025’ programme on the horizon, Chinese nation-state-sponsored espionage and intellectual property (IP) theft pursuits will likely ramp up against the technology and manufacturing sectors, with the Chinese government seeking to bring innovative technology to global markets.

These campaigns will likely be intensified following the re-election of US President Donald Trump, with the administration intending to implement tariffs targeting imported Chinese technology products. 

With US-China tensions likely to rise, Beijing’s state actors such as Volt Typhoon, will likely pivot to a more disruptive posture by attempting to sabotage US critical sectors. These attacks will likely carry the objective of pre-positioning cyber exploitation and attack capabilities within Western networks to prepare for future hostilities with the US and to disrupt communication infrastructure between Washington and East Asia during any future crisis.

Chinese cyber activity will likely be aggravated following the strengthened trilateral relations between the US, Japan, and the Philippines, with these states discussing key topics including the Taiwan Relations Act obligating Washington to provide weapons to defend Taipei as well as the Philippines and Japan being US defence treaty allies.

End Of Russia’s War In Ukraine?

Based on statements leading up to the 2024 US presidential election, the Republican Party presidency raises concerns about the future of US support for NATO and Ukraine. While it is unlikely that the US will abandon NATO under the administration, there is a realistic possibility that Europe could see the US shift focus domestically, leaving the continent to face off against Russia in a weakened condition both militarily and in cyberspace. 

As a result, the Russian Federation will almost certainly leverage its cyber program to conduct espionage against US government networks at the start of 2025, with Moscow’s threat actors collecting intelligence on the Trump administration’s intentions of ending the war in Ukraine.

Cyber Activists To Protest Republican Party Foreign Policy

Throughout the Republican Party campaign, Trump reiterated his desire to end the conflicts in Ukraine and the Middle East. If successful, there is a realistic possibility that hacktivist activity will decrease in correspondence with conflict activity. However, should the current conflicts remain active, it is highly likely that there will be a continuation of historical targeting mirroring the attack behaviour in 2023 and 2024.

Both pro-Palestinian and pro-Russian Hacktivist efforts, consisting of distributed denial-of-service (DDoS) attacks, will likely peak against US government assets on January 20th, 2025, during the presidential inauguration in protest against Republican Party foreign policy. 

Craig Watt is a Threat Intelligence Consultant at Quorum Cyber specializing in strategic and geopolitical intelligence.

Image: BirgitKorber

You Might Also Read:

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« FBI & CISA Advice - Use Encrypted Messaging

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.