Skip to content

Cyber Escalation – The conflict dyad USA/Iran as a test case

At the beginning of July 2020, a series of detonations in the Iranian nuclear fuel enrichment plant in Natanz triggered fears of a Stuxnet 2.0. The Stuxnet computer worm, which physically destroyed Iranian nuclear centrifuges in 2010, is considered by many as the starting point for the smoldering cyber conflict between Iran and the USA. Stuxnet is still considered to be one of the most aggressive cyber attacks to date because it was the first digital malware to cause damage in physical space, thus reaching a new level of intensity. In the words of former NSA director Gen. Michael Hayden, “someone crossed the Rubicon” with Stuxnet. The conflict dyad USA-Iran is particularly interesting from the perspective of cyber security research and international relations since disputes are carried out in the cyber- and information space as well as in the conventional, physical domain. The interaction between the two cyber powers has a “cross-domain” dimension, which has been rarely studied so far.

More external publications

  • Research and Analysis
Hand and Glove: How Authoritarian Cyber Operations Leverage Non-state Capabilities

26 June 2025
In this article, Jakob Bund examines how authoritarian states like Russia, China, and North Korea increasingly harness non-state cyber actors to expand their capabilities, blur attribution, and complicate global responses. He argues that this growing fusion of state and criminal or contractor activity demands integrated threat assessments and response tools that can operate independently of political attribution.

Welcome to our Cyber Incident Dashboard!

For best results, please view on a desktop device.