In the shadow of screens: cyberattacks that redraw the world

Reading time: 13 minutes

We are entering an era where cyber attacks are no longer confined to isolated technical incidents. They become instruments of power, geopolitical levers, economic models and sometimes even weapons with systemic effects.

Through a series of events now too frequent around the world, a reality is required: cybercrime no longer merely disrupts the established order, it redefines how nations confront each other, how businesses survive and how citizens live.

The illusion of a connected world, but never protected

Digital modernity has long been based on fiction: that of a reliable, transparent and secure global network.

Recent examples show exactly the opposite.

In different countries, hospital networks have been paralyzed for days, forcing thousands of medical acts to be postponed. Elsewhere, the supply chain of food operators has been disorganized to the point of causing sudden shortages in the shelves. Other regions saw car factories shut down their production for several weeks, resulting in daily losses of several hundred million.

These crises are no longer anomalies.

They reveal a global system based on a Digital interdependence which also becomes a interdependence of vulnerabilities.

Cyber Attacks: A New Economy of Chaos

Globally, cybercrime losses are now valued in terms of billions of dollars per year, a level equivalent to the GDP of major economic powers. This means one essential thing: cybercrime is no longer a marginal phenomenon, but a real phenomenon. parallel economystructured and internationalized.

It now relies on:

  • sophisticated clandestine infrastructure,
  • platforms selling turnkey attack kits,
  • global networks capable of coordinating mass extortion,
  • payment systems anonymised by cryptocurrency and mixers,
  • an organization in « sectors » comparable to the major organized crime industries.

In this economy, innovation is permanent, fierce competition, and victim protection is never guaranteed; even when they give way to blackmail.

When crime is confused with public authority

In many parts of the world, cyberattacks no longer come only from isolated criminal groups.

They are part of State strategies, explicit or hidden.

Some operations targeted leading financial institutions, siphoning in minutes the equivalent of national fortunes. Others have for years been infiltrating critical grid or telecommunications systems.

Some campaigns have even been designed to disrupt democratic processes, weaken international alliances or destabilize entire economies.

Cyberspace then becomes:

  • a battlefield,
  • a laboratory of influence,
  • a coercive diplomatic tool,
  • a grey area where responsibilities are deliberately blurred.

It becomes difficult to distinguish the hand of a criminal from that of a state. Sometimes the two are just one.

The lessons of a defenceless built Internet

One of the basic explanations for this vulnerability is the very nature of the Internet. Experts recall that the global network was never designed to be secure.

Built by successive stacking of heterogeneous technologies, the infrastructure includes:

  • structural faults,
  • obsolete protocols,
  • uncontrolled areas,
  • millions of potential entrance doors.

Today it would be impossible to rebuild a clean, coherent, secure Internet without dismantling the existing one. And no one has the political will.

Cryptocurrencies: oxygen of cybercrime

Cryptocurrency, originally presented as a financial emancipation tool, has become the driving force behind much of global cybercrime.

Their role goes beyond the simple transaction:

  • they allow to anonymize flows,
  • facilitate mass extortion,
  • free criminals from national jurisdictions,
  • discourage victims from reporting attacks at risk of exposing their vulnerability.

Mixers, these devices mixing different streams to blur the tracks, made tracking even more difficult, despite the advances of the investigation teams.

Artificial intelligence: the rupture that amplifies everything

We reached a tipping point.

Artificial intelligence not only transforms cybercrime, but also democratize access, automates gestures and increases efficiency.

Undetectable phishing

AIs generate messages, images, voices and scenarios so convincing that fraud signals disappear.

Automated fault search

Models detect in real time unknown faults that even human experts would never have identified.

Dark LLM and IA derived

Modified versions of public models appear, specially designed to circumvent safeguards and produce illegal instructions.

Self-employed

The most worrying scenario: AIs capable of leading an end-to-end attack, without human intervention, from the conception of malware to money laundering.

This perspective no longer belongs to science fiction. She's already emerging.

A world recouped by digital geopolitics

The cyber threat is now rhythmic by three major dynamics:

  1. Technology and strategic rivalry between the United States and China, focusing on AI, semiconductors and global digital infrastructure control.
  2. The structural fragility of Europe, technologically dependent, fragmented and lagging behind in protecting its critical infrastructure.
  3. The opportunistic strategy of actors seeking to destabilize entire regions, using cyberspace as a hybrid war lever at very low cost.

Cyberspace has become a scene of power relations that will decide the new global balance in the coming decades.

A horizon of risks that we can no longer ignore

The world is gradually moving towards an environment where cyberattack becomes a total social fact: economic, political, societal, strategic.

The threat is no longer punctual: it becomes a continuum. And the rise of the AI, an amplifier of crime and power, opens a completely new chapter, still largely out of control.

In this new configuration, cybersecurity is no longer an engineering business. It is a civilizational issue: a revealing of collective fragility, a test of resilience for companies, and a decisive factor of stability for nations.

The real challenge in the coming years will not only be to counter attacks, but to rethink our global relationship to technology, digital sovereignty and the vulnerability of modern societies.

Modes of attack, procedure and protective measures

Attack modeTest procedure (Summary mechanism)Major risksRecommended methods of prevention
Phishing / Spear PhishingSending e-mails or messages imitating a trusted third party to push the victim to click, provide identifiers or upload an trapped file. Variant: custom targeting ("spear").Identity theft, compromise of the IS, spread of malware, fraud to the president.– Regular awareness of the teams- Systematic MFA- Advanced mail filtering (sandbox)- Policy DMARC/DKIM/SPF- Phishing simulations
RansomwareSI infection followed by massive data encryption and ransom demand. May result from phishing, exposed RDP access or vulnerability.Total loss of access to data, cessation of activity, reputational impact.– Offline backups ("3-2-1 backup")- Network segmentation- MFA on all external accesses- Rigorous Patch Management - EDR/XDR
Malware (Trojans, spyware, keyloggers)Infiltrated malware via attachments, compromised websites, USB drives, fraudulent downloads.Data mining, spying, takeover of the station.– New generation antivirus/EDR- USB blockage / installation restrictions- Automated update- Secure navigation
Attacks by brute force / Credential StuffingAutomated test of thousands/million password combinations or reuse of stolen passwords.Compromising sensitive accounts, unauthorised remote access.– Mandatory MFA- Robust password policies- CAPTCHA + attempt limitation- Surveillance of suspicious connections
Zero-Day fault operationExploitation of an unknown supplier vulnerability, often detected through the AI or automated fault search.Discreet intrusion, without immediate patch solution, deep compromise.– EDR/XDR- Architecture Zero Trust- Behavioural Detection- Quick update as soon as patch is published
Supply Chain AttacksCompromise a supplier, third party software or an update to infect all client organizations.Massive infection, silent dissemination, data damage and critical processes.– Security Audit Providers- Digital Signature of Updates- Zero Trust Principles- Behavioural Monitoring
Social engineeringPsychological manipulation: telephone calls, identity fraud, false technicians, emergency scenarios.Extract IDs, trigger fraudulent payments, get physical access.– Strict identity verification procedure- Regular training- Internal anti-scam charter- Double control of payments
DDoS AttacksVoluntary saturation of a server or platform by generating massive traffic.Unavailability of service, loss of turnover, network overload.– Anti-DDoS solutions- CDN- Load distribution- Redundant architecture
SQL Injection / Web AttacksInsert malicious requests into a form or URL to manipulate the database.Theft, modification or deletion of data, application control.– Secure Development (OWASP)- Application Firewall (WAF)- Regular Intrusion Tests- Input Validation
Man-in-the-Middle (MITM)Interception of communication between two parties: compromised Wi-Fi network, certificate usurpation, diversion of DNS.Theft of sensitive data, diversion of access, fraud.– HTTPS/TLS mandatory- Professional VPN- Secure DNS- Public Wi-Fi deactivation
Privileged accounts (PAM)Theft or abuse of admin accounts, often via targeted phishing or elevated silent privileges.Total control of the IS, deployment of massive attacks, erasure of traces.– Privilege Access Management (PAM) – Administrative password rotation - Continuous monitoring - Strong segmentation
Professional courier (BEC)Overwhelming internal e-mail to order a transfer of funds or change a RIB.Potentially massive financial fraud.– MFA on courier- Independent telephone verification- Double validation process for payments- DMARC/DKIM/SPF
Deepfake and voice/video usurpationUsing AI to imitate a voice or face to convince a collaborator to carry out a critical action.Fraud, financial transfers, manipulation.– Internal off-channel verification procedures- Specific awareness IA- Prohibition of acting on voice call
Attack on APIsExploitation of faults in unprotected or poorly authenticated program interfaces (PAIs).Massive data extraction, diversion of service.– Strong authentication- Rate limitation- Security tests API- WAF/API Gateway
Physical compensationAccess to a server room, computer theft, installation of spy equipment.Direct access to data and infrastructure.– Physical access control- Disc encryption- Video surveillance- Badge management

10 essential cybersecurity reflexes

  1. Never click without checking : Examine sender, links, message consistency. Doubt must always benefit from caution.
  2. Enable multifactor authentication anywhere : It is the simplest and most effective bulwark against the compromise of accounts.
  3. Use robust and unique passwords : No password should be reused. A password manager is essential.
  4. Verify any change in BIR or urgent request : Call the supplier or manager on a known number: never answer via the received email.
  5. Never connect any unknown support (USB key, disk, cable) : Infected supports remain one of the most trivial entrance doors.
  6. Update computers, software and mobile immediately : Uncorrected faults are the preferred target of automated attacks.
  7. Close unnecessary remote access : RDP or VPN-type protocols open to all are a constant threat.
  8. Never transmit sensitive information by telephone without verification : Vocal deepfakes make the usurpation extremely credible: always validate off-channel.
  9. Save regularly and offline : A disconnected backup is the only insurance against a ransomware.
  10. Report suspicion immediately : An early incident becomes a limited incident. Silence amplifies the damage.

Conclusion

The cross-sectional reading of the different methods of attack highlights a central truth: the most exploitable flaw remains the human being. Behind the majority of successful intrusions, we find an unfortunate click, a misplaced confidence or a procedure too quickly bypassed.

Phishing and social engineering continue to pave the way for most compromises, confirming that cybersecurity is never only a technological issue, but above all an issue of behaviour and collective vigilance.

However, modern attacks now require a defence architecture that goes beyond conventional approaches.

Threats related to zero-day faults, unsecured APIs or the supply chain demonstrate that the protection of the information system must become global, continuous and based on tools capable of detecting weak signals.

In this context, the association of Multifactor authentication, Advanced Monitoring (EDR/XDR), rigorous network segmentation, disciplined patch managementand offline backups actually tested is the minimum foundation of a resilient enterprise.

More broadly, the adoption of the model Zero Trust Today is an inescapable paradigm shift: considering that every connection, every user and every equipment can potentially be compromised makes it possible to restructure the entire security system around systematic verification.

To this demand is added an aggravating factor: the fulcruming rise of artificial intelligence, which increases the power, accuracy and speed of attacks, making prevention more critical than ever.

In this new environment, no organization is too modest or too specialized to be spared.

Cybersecurity is becoming an element of strategic governance, a lever of trust and a condition of business continuity. It is now in the capacity to anticipate, train and structure collective reflexes that the difference between a vulnerable and a resilient enterprise is involved.

Security is not a cost, but a condition of existence in the contemporary digital economy.

Sources and references

Title of studyContent / Value addedLink
Global Cybersecurity Outlook 2025 – World Economic ForumA global overview of cyber risks for 2025, based on strategic investigations and analysis. Global Cybersecurity Outlook 2025
Internet Organized Crime Threat Assessment (iOCTA) – EuropolStudy on organised cybercrime in Europe: trends, actors, typologies. The Internet Organized Crime Threat Assessment
Cyber Threat Overview 2024 – ANSSI (France)French national analysis of cyber threat: data, typologies, vectors. Cyber Threat Overview 2024
Annual Cyber Threat Report 2024-25 – Australian Cyber Security Centre (ASD)Australian report highlighting the evolution of the threat, incidents, the role of states. Annual Cyber Threat Report 2024-2025
Cybersecurity and cybercrime: Current trends and threats – Arkadi Tiutiunyk et al.Academic article in open access: synthesis of cybercrime trends, useful for theoretical framing. Cybersecurity and cybercrime: Current trends and threats

Leave a comment

🌳 BAOBIZZ newsletter

Every Monday, get the best tests from BAOBIZZ — An African look at the world in your mailbox.

🌳 Join the BAOBIZZ community

African debates, reflections and dilemmas — Every week on WhatsApp.

→ Join the group
EnglishenEnglishEnglish

Learn more about BAOBIZZ: An African Perspective on Global Issues

Subscribe to continue reading and have access to all archives.

Continue reading