Trump 2.0: Cyberwarfare To Reach New Heights

Trump 2.0: Cyberwarfare To Reach New Heights


President-elect Donald Trump will enter the White House on January 20th, 2025, with the Republican Party now holding a majority in the upper and lower chambers of the United States Congress (the Senate and the House of Representatives). 

However, the position of the Republican Party regarding ongoing interstate conflicts will almost certainly pose serious challenges for global cybersecurity throughout 2025 with regional instability resulting in the realignment of diplomatic relations and shifts in world power dynamics.

This will likely involve nation-states leveraging their cyber programmes to attack critical sectors in the US to gain international advantage. As a result, the impact will also likely be felt across global cyber space, meaning that both public and private sector organisations must prepare to prioritise risk management strategies.

Today, cyber risk should be taken as seriously as economic risk.  

Iran Faces A New Financial Crisis

Iran will harness its cyber capabilities to retaliate against expected economic sanctions to be enforced under the new Republican Party government. Tehran will be forced to manage escalation risks in the Middle East whilst conducting aggressive network operations against critical sectors in the US as the regime’s reputation and regional stability are at stake.

Espionage sponsored by the regime will likely seek to collect intelligence on US foreign policy regarding the Joint Comprehensive Plan of Action (Iran’s nuclear deal) as well as to gauge the position of the US government’s support of Israel against Iran’s Axis of Resistance proxies throughout the Middle East.

The Western financial sector will likely be at a heightened risk from this cyber targeting, with Iranian threat actors pivoting to financially motivated cyber-attacks.

This is partly because  President-elect Trump is likely to enforce further sanctions against Iran, mirroring the ‘maximum pressure’ policy’ that was applied during the previous Republican Party administration.

Trump Rallies A Cabinet Of China Hawks To Combat Beijing

President-elect Trump has established a cabinet consisting of China hawks that will likely result in increased tensions between Beijing and Washington for years to come. In 2025, this will likely transition into cyber space by Chinese espionage actors seeking to collect intelligence on the diplomatic relations between the US and Taiwan as well as to gauge the position of the Republican Party’s intentions of pushing back against China’s territorial claims in the South China Sea. 

Further, with the imminent deadline of the ‘Made in China 2025’ programme on the horizon, Chinese nation-state-sponsored espionage and intellectual property (IP) theft pursuits will likely ramp up against the technology and manufacturing sectors, with the Chinese government seeking to bring innovative technology to global markets.

These campaigns will likely be intensified following the re-election of US President Donald Trump, with the administration intending to implement tariffs targeting imported Chinese technology products. 

With US-China tensions likely to rise, Beijing’s state actors such as Volt Typhoon, will likely pivot to a more disruptive posture by attempting to sabotage US critical sectors. These attacks will likely carry the objective of pre-positioning cyber exploitation and attack capabilities within Western networks to prepare for future hostilities with the US and to disrupt communication infrastructure between Washington and East Asia during any future crisis.

Chinese cyber activity will likely be aggravated following the strengthened trilateral relations between the US, Japan, and the Philippines, with these states discussing key topics including the Taiwan Relations Act obligating Washington to provide weapons to defend Taipei as well as the Philippines and Japan being US defence treaty allies.

End Of Russia’s War In Ukraine?

Based on statements leading up to the 2024 US presidential election, the Republican Party presidency raises concerns about the future of US support for NATO and Ukraine. While it is unlikely that the US will abandon NATO under the administration, there is a realistic possibility that Europe could see the US shift focus domestically, leaving the continent to face off against Russia in a weakened condition both militarily and in cyberspace. 

As a result, the Russian Federation will almost certainly leverage its cyber program to conduct espionage against US government networks at the start of 2025, with Moscow’s threat actors collecting intelligence on the Trump administration’s intentions of ending the war in Ukraine.

Cyber Activists To Protest Republican Party Foreign Policy

Throughout the Republican Party campaign, Trump reiterated his desire to end the conflicts in Ukraine and the Middle East. If successful, there is a realistic possibility that hacktivist activity will decrease in correspondence with conflict activity. However, should the current conflicts remain active, it is highly likely that there will be a continuation of historical targeting mirroring the attack behaviour in 2023 and 2024.

Both pro-Palestinian and pro-Russian Hacktivist efforts, consisting of distributed denial-of-service (DDoS) attacks, will likely peak against US government assets on January 20th, 2025, during the presidential inauguration in protest against Republican Party foreign policy. 

Craig Watt is a Threat Intelligence Consultant at Quorum Cyber specializing in strategic and geopolitical intelligence.

Image: BirgitKorber

You Might Also Read:

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« FBI & CISA Advice - Use Encrypted Messaging
Strengthening Britain's Cyber Defences »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Slovak National Accreditation Service (SNAS)

Slovak National Accreditation Service (SNAS)

SNAS is the national accreditation body for Slovakia. The directory of members provides details of organisations offering certification services for ISO 27001.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

OnDefend

OnDefend

OnDefend delivers information security solutions that improve overall security posture, reduce risks and defend against continually evolving and persistent cyber adversaries.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.