02/05/2026 | Press release | Archived content
In the contemporary theatre of twenty-first-century geopolitics, a new class of actors has taken center stage in the cyberspace world: the so-called cyber-proxy groups. These entities move in the digital undergrowth that lies between states, criminal organizations, and ideological movements, exploiting the global interconnectedness of networks to project power far beyond their physical borders. In doing so, they contribute to transforming cyberspace into a strategic domain.
The notion of proxy warfare is as old as organized conflict itself, as states have long relied on intermediaries - be they militias, privateers, or paramilitary formations - to advance their interests while limiting the political and material costs of direct confrontation. In the cyber domain, which constitutes a relatively new but now consolidated battlefield, cyber-proxy groups represent the digital evolution of this practice. They have become a cornerstone of modern hybrid warfare doctrines, in which diplomatic pressure, information operations, economic coercion, and cyber acts are deliberately blended. Within this framework, the traditional boundary between war and peace, or between internal security and external aggression, is intentionally blurred, making it harder to identify when a situation has escalated into open conflict.
These actors are, therefore, not merely conventional criminal groups motivated solely by financial gain. Rather, they increasingly function as instruments of foreign policy and strategic influence, enabling states to conduct espionage, sabotage, disruption of critical infrastructure, and large-scale influence operations in the information space. Activities that, if carried out overtly by regular armed forces or official government agencies, might be interpreted as an armed attack or an act of war can, when delegated to cyber-proxies, be reframed as deniable incidents, criminal acts, or the work of loosely affiliated "patriotic hackers". In this way, states exploit the inherent opacity of cyberspace to test red lines, probe adversaries' defenses, and shape the strategic environment while attempting to avoid the legal and diplomatic consequences of direct attribution.
From a legal and political standpoint, cyber-proxy groups operate in a persistent gray zone. Their formal independence from state structures - whether real or merely asserted - provides sponsoring governments with the most valuable asset in an era of great-power competition: plausible deniability, which is the ability to credibly contest or obfuscate responsibility for a cyber operation. By outsourcing or informally tolerating hostile activities to such intermediaries, states seek to preserve strategic ambiguity, complicate attribution, and reduce the risk of large-scale escalation, all while continuing to exert meaningful pressure on adversaries through the cyber domain. As a result, cyber-proxy groups have become emblematic of the broader logic of contemporary hybrid conflict, where influence, disruption, and coercion increasingly replace open armed confrontation.
A Cyber Proxy is a non-state threat actor that conducts offensive cyber operations[1] on behalf of, or in support of, the strategic objectives of a state threat actor, without formal and state-sanctioned military or intelligence affiliation.
The nature of "proxy" is defined by three fundamental technical and strategic attributes:
Cyber proxy groups can be considered as the digital equivalent of the "little green men" - unmarked military personnel deployed in hybrid operations - in that both represent threat actors whose state affiliation is deliberately ambiguous, allowing the sponsoring state to achieve strategic objectives while operating below the threshold that would typically justify a conventional military response or unified international sanctions regime. One of the most evident laboratory of the integration of cyber proxies into a hybrid warfare strategy is the current war in Ukraine, where cyber operations preceded, accompanied, and followed kinetic military maneuvers on the ground.
In the complex ecosystem of modern cyber threat intelligence, cyber proxy groups represent one of the most sophisticated and challenging elements for analysis and attribution.
The need for states to conduct offensive operations in cyberspace while maintaining a degree of separation that permits plausible deniability has created a situation where the line between state, parastate, and criminal actors has progressively blurred, requiring analysts to develop increasingly sophisticated methodologies to understand the actual dynamics at play.
The distinction between technical attribution and political attribution represents one of the fundamental concepts for understanding the complexity of analyzing cyber proxy groups. These two approaches, while interconnected, operate on different levels and require distinct methodologies, skills, and considerations:
The tension between these two approaches becomes particularly evident when analyzing cyber proxy groups, as - while technical attribution might indicate the use of infrastructure and tools not associable with specific threat actors - political attribution might reveal a choice of targets and timing that suggests state strategic direction. This discrepancy is not accidental but often represents the deliberate result of obfuscation strategies.
Figure 1 - The different levels of attribution
Source: author's elaborationThe attribution of attacks to cyber proxy groups represents one of the most complex challenges in modern cyber threat intelligence. This complexity derives from the intrinsically stratified and deliberately obscured nature of these operations, specifically designed to resist analysis and identification. In particular, four different levels of complexity in attribution can be distinguished:
As a result of these misalignments, different organizations can reach different conclusions even though they were based on the same data.
All the challenges that have just been discussed carry highly significant repercussions on operational and response activities. As the complexity of cyber proxy group attribution activities continues to grow with technological and geopolitical evolution, the future success of these activities will depend on the security community's capacity to adapt rapidly, collaborate effectively, and accept that in the era of cyber proxies, ambiguity is a feature to be managed.
The fundamental distinction between directly managed nation-state groups and cyber proxies lies in the degree of control, accountability, and formal separation from official state structures.
Directly managed nation-state groups: they operate as formally integrated units within military or intelligence structures. They receive direct input, operate with allocated state budgets, follow formal chains of command, and their members are often government employees with appropriate security clearances. Their operations are planned and approved through formal bureaucratic processes, with direct oversight and control by state authorities. Examples include dedicated military cyber units or specialized divisions within intelligence agencies. The management of these groups follows established military or intelligence protocols. Operations are planned with clear strategic objectives, defined rules of engagement (RoE), and deconfliction[7] mechanisms to prevent interference with other state operations. Personnel receive formal training, have access to advanced technological resources developed internally, and operate from secure government facilities.
Figure 2 - Deconfliction layers
Source: author's elaborationCyber proxy groups: they exist in a liminal space characterized by formal separation but informal control. These groups can take various forms such as private contractors working on commission, criminal groups receiving protection in exchange for services, ideologically aligned hacktivists receiving indirect support, or front commercial entities masking intelligence operations. Coordination occurs through multiple layers of intermediation, such as the commonly used "digitaldead drops"[8], which allow information exchange without direct contact and coded communication protocols.
Financial control represents a critical but vulnerable vector. Cyber proxy groups use cryptocurrencies with mixing services to obscure financial flows, shell companies in opaque jurisdictions to channel funds, and commodity trading or online gambling as money laundering mechanisms. Some more sophisticated groups have also developed internal economies based on criminal services that generate self-financing, thereby reducing dependence on traceable state funds.
The management of knowledge and technical capabilities requires balancing effective sharing with compartmentalization. Tools and exploits are distributed through encrypted repositories with granular access, controlled underground marketplaces that mask state transfers as criminal transactions, and deliberate "tool leaks" that permit distribution while maintaining deniability. Training occurs through anonymous online platforms, seemingly public technical documents with steganographic messages, and remote mentoring through "digital personas"[9].
In the context of cyber threat intelligence, Cutout is a person, entity, system, or infrastructural resource that serves as an intermediary between the primary actor (e.g., an APT group) and the target or other operational nodes, with the objective of protecting the identity or direct responsibility of the primary actor. In the technical-operational context, a cutout is often an element of technical or logistical infrastructure, such as VPS acquired from third parties or via stolen credit cards and used for C2 relay, compromised bots used for traffic proxying to real C2 infrastructure, Tor exit nodes, no-log VPNs or reverse proxies, CDN abuse (e.g., via Cloudflare, Akamai) to protect the real backend.
To illustrate the layered relationships among a state, its nation-state group, a cyber proxy group, and a cutout intermediary, consider a simplified, hypothetical scenario drawn from documented patterns in cyber operations (such as those observed in state-sponsored espionage campaigns).
In this model:
Figure 3 - Example of relationships among a state, its nation-state group, a cyber proxy group, and a cutout intermediary
Source: author's elaboration
This structure exemplifies how states project influence through deniable layers, blurring responsibility while achieving geopolitical aims. Naturally, the diagram shown in Figure 3 illustrates only a simplified scenario; in practice, far more intricate configurations can arise, in which the relationships between the same actors and the operational infrastructures they employ become significantly more complex.
The following figure shows a scenario where the "deniability" of the sponsoring state is achieved through different services and technologies:
Figure 4 - State-sponsored cyber proxy ecosystem and operational relationships diagram
Source: author's elaborationFigure 4 provides a concrete illustration of the main dynamics within a typical state cyber proxy ecosystem. In this example, the political and military leadership sit at the apex of the structure, defining the overarching national strategic objectives. These objectives are then translated into operational priorities by the primary intelligence services, which both retain their own organic cyber capabilities and cultivate relationships with proxy groups. The lead intelligence service coordinates these activities through a dedicated center that functions as a central hub for planning, deconfliction, and the allocation of resources across operations.
The intermediate layer is crucial for maintaining plausible separation. Government contractors provide advanced technical capabilities while maintaining formal separation from state structures. Seemingly independent think tanks and research institutes develop offensive capabilities under the cover of security research. Universities with specialized programs serve as recruitment pipelines, identifying and cultivating talent that can be directed toward proxy groups. Handlers operate as cutouts, maintaining separation between state control and proxy operations.
The supporting infrastructure completes and reinforces the entire ecosystem, enabling it to operate at scale and with resilience. Bulletproof hosting providers underpin the durability of offensive infrastructure by offering hosting services that remain resistant to takedown efforts and law-enforcement pressure. Money laundering networks process and obfuscate payments, preserving financial anonymity for the actors involved. Recruitment channels continuously identify, vet, and attract new talent into the ecosystem. Dedicated development teams design, build, and maintain offensive tools, which are then circulated, adapted, and reused across the broader ecosystem.
Figure 5 - Real-world example of the Dual-Purpose Model use of the APT41 threat actor
Source: author's elaborationFigure 5 represents a real-world example of the state-sponsored threat actor APT41 (also known as Double Dragon, Barium, Winnti umbrella), which is a cyber proxy group sponsored by the Chinese state. It operates as a semi-autonomous entity, carrying out both:
This dual role - state-directed and criminal - is the defining characteristic of a cyber proxy.
Each of the major nation-states (Russia, China, North Korea, and Iran) - whose threat actors are continuously monitored - has developed a distinct model for managing proxy groups.
A particularly relevant case study is the model adopted by the Russian Federation, which has developed one of the most sophisticated and extensive cyber proxy ecosystems in the global threat landscape. This ecosystem is characterized by a complex web of relationships among state intelligence services, military units, cybercriminal organizations, and private contractors. It represents a strategic evolution from traditional state-sponsored cyber operations toward a more "nuanced approach", leveraging the capabilities and resources of non-state actors while maintaining strategic control and plausible deniability.
The organizational structure of Russian cyber proxy operations is built around three primary intelligence and military entities:
Each of these organizations has developed distinct approaches to proxy relationships, reflecting their different operational mandates, target sets, and strategic objectives.
The relationship between Russian state actors and cybercriminal groups has evolved significantly over the past decade, shifting from what researchers have termed "passive tolerance" to "active management." This evolution has taken the form of the so-called "Dark Covenant model," a sophisticated proxy-management approach that grants cybercriminal groups "controlled impunity" in exchange for operational support and alignment with state objectives. Under the Dark Covenant model, cybercriminal groups are allowed to conduct financially motivated operations with minimal interference from Russian law enforcement, provided they refrain from targeting Russian entities and remain available for state-directed operations when requested. This arrangement offers several strategic advantages for the Russian state, including access to advanced technical capabilities, established operational infrastructure and the ability to conduct operations with enhanced plausible deniability. For the cybercriminal groups, instead, the agreement provides protection from law enforcement action as well as access to intelligence and resources that enhance their operational capabilities
The implementation of the Dark Covenant model involves sophisticated coordination mechanisms between state actors and cybercriminal groups. Intelligence services provide targeting information, technical resources, and operational protection to cybercriminal groups, in exchange for conducting specific operations or providing access to compromised networks. This coordination is typically mediated through intermediary organizations, which provide operational security and compartmentalization while maintaining strategic control over high-level objectives.
Plausible deniability in the cyber domain rests on the inherently anonymous and borderless nature of cyberspace. Unlike traditional kinetic operations, where responsibility can often be inferred from tangible physical evidence, in cyberspace achieving definitive attribution may be technically unattainable or may require levels of capability, resources, and access to sensitive information that lie beyond what most victim organizations or states can realistically muster.
The strategy of plausible deniability by states offers multiple advantages: it allows avoiding direct diplomatic consequences, maintains stability of bilateral relations even during offensive operations, allows testing adversary defenses without formal escalation, and offers operational flexibility without the constraints of international law applicable to traditional military operations.
This framework, however, requires meticulous planning and significant investments. It is not simply about denying involvement post-facto, but about structuring operations from the start so that definitive attribution is technically and politically problematic. This compels the creation of multiple layers of obfuscation, compartmentalization of information, and development of credible alternative narratives.
In summary, the aspects that states exploit to achieve plausible deniability are the following:
Operational compartmentalization manifests at multiple organizational and technical levels. At the strategic level, operations are segmented into independent cells with limited knowledge of the overall picture. Each cell knows only its own part of the mission, without visibility into ultimate objectives or principals. This "need-to-know" model limits the risk that compromise of a single element can expose the entire operation. At the tactical level, compartmentalization extends to technical expertise. Separate teams manage malware development, infrastructure acquisition, initial access operations, lateral movement, and data exfiltration.
This separation not only improves operational efficiency through specialization but also creates natural barriers to complete reconstruction of operations by analysts. Compartmentalization is also reflected in the technical architecture of operations. Cyber proxy groups implement rigorous infrastructure segmentation, with dedicated servers for different attack phases and absence of direct connections between critical components.
They use separate communication channels for command and control, data exfiltration, and operational coordination. They implement "kill switch" mechanisms that allow selective deactivation of parts of the operation without compromising other components. A crucial aspect is temporal compartmentalization. Operations are structured in discrete phases with deliberate pauses between phases to complicate correlation. Moreover, different teams can operate in separate time windows, creating the appearance of multiple uncoordinated actors. This temporal fragmentation is particularly effective against detection systems that rely on patterns of continuous activity.
The management of operational identities represents a critical element of compartmentalization. Operators use separate digital personas for different operations, with credible backstories and digital footprints constructed over time. These identities are maintained rigorously separate, with dedicated devices, separate Internet connections, and operational protocols that prevent cross-contamination.
The integration of cyber operations with information operations generates powerful reinforcing effects, as technical intrusions are deliberately paired with narrative manipulation. Stolen data is selectively leaked to sustain pre-defined storylines, while subtle alterations to exfiltrated documents inject hard-to-detect disinformation into the public domain. The timing of these releases is carefully synchronized with key geopolitical events to maximize psychological impact and sow confusion among target audiences, and technical false flags are amplified through coordinated influence campaigns that further distort attribution and perception.
Tim Maurer's classification model represents the first systematic and empirically grounded framework for categorizing relationships between states and non-state cyber actors. The model is based on two orthogonal dimensions:
1) The state-proxy relationship dimension, which identifies three distinct models along a spectrum of state control:
2) The technical-operational sophistication dimension, which classifies actors along a six-tier scale from Tier I to VI:
Figure 6 - Proxy Classification using Maurer framework
Source: author's elaborationWithin this classification, a fundamental trade-off becomes evident: Control and deniability are inversely correlated. This translates in the way the state operates:
In this context, the concept of a "Sweet Spot" is used to denote the optimal combination of characteristics that maximizes operational utility for the state sponsor, balancing the control-deniability trade-off. The Sweet Spot corresponds to the Tier IV x Orchestration intersection.
Empirical observations of APT groups documented by MITRE ATT&CK (which catalogs 14 tactics and over 200 techniques observed in cyber operations) show the following distribution:
As states increasingly resort to cyber proxies to pursue strategic objectives while avoiding escalation, the inadequacy of existing legal and regulatory frameworks becomes apparent. In order to address this issue, technical innovation will be necessary, as will international dialogue to redefine responsibilities within the cyber domain.
[1] Offensive Cyber Operations (OCO) refer to deliberately designed actions to penetrate, degrade, destroy, or manipulate information systems, networks, and digital assets of an adversary, in order to obtain strategic, tactical, or operational advantages. Unlike defense operations or "passive" exploitation operations (e.g., CNE-Computer Network Exploitation), OCO falls within the category of CAN-Computer Network Attack, according to DoD/NATO taxonomy. In the CTI context, OCO constitutes the most advanced expression of state or state-sponsored actors' offensive capabilities, and their study is essential for technical and strategic attribution, analysis of APT capability and intent, prediction of future campaigns or attacks on critical infrastructure and triage of high-impact incidents.
[2] In the context of cyber operations and threat intelligence, a persona refers to a carefully constructed digital identity or public profile that a threat actor assumes to conceal their true nature, origin, or intentions. This fabricated identity typically includes a documented history of activities, attributed nicknames, associated accounts across multiple platforms, and a consistent pattern of behavior that aligns with a specific criminal or activist narrative. By maintaining an established persona - often spanning years of underground activities or public attribution - cyber proxies and state-sponsored actors can deflect attribution from their true sponsors, as investigators and security researchers may incorrectly attribute ongoing operations to the historical persona rather than recognizing the shift in operational patterns or the involvement of a state actor. A persona thus serves as a crucial misdirection tool in hybrid cyber operations, allowing actors to exploit existing reputational associations and law enforcement blind spots.
[3] Plausible Deniability refers to a state's ability to credibly disavow responsibility for hostile actions carried out on its behalf by non-state actors. It is maintained through operational separation, use of third-party infrastructure, intermediaries, and deliberate attribution confusion, allowing states to achieve strategic objectives while avoiding direct accountability and escalation risks.
[4] Second-guessing is an analytical phenomenon in which an intelligence analyst refrains from formulating or sharing a definitive assessment (e.g., on attribution, intent, or capability) for fear of being wrong, often deferring conclusions, softening language, or assuming excessively cautious and indecisive positions.
[5] Competing narratives are competing narratives - often conveyed by analysts, states, CTI vendors, or media - that describe the same cyber event differently, sometimes with divergent informational purposes.
[6] Analysis of Competing Hypotheses (ACH) is a structured analytic technique in which an analyst systematically compares multiple, mutually exclusive hypotheses against the available evidence, focusing on disproving less likely explanations in order to identify the hypothesis that best fits the observed facts.
[7] In a state context with cyber proxies, deconfliction is the process by which a state intelligence service ensures that cyber offensive (or clandestine) activities conducted by a proxy group do not interfere, collide with, or compromise ongoing operations (by other units or the state itself), sensitive assets of strategic interest, or other allied actors or undercover structures.
[8] From an operational perspective, a digital dead drop is an indirect communication technique in which a threat actor leaves a message, payload, cryptographic key, or command in a predefined virtual location, which another actor can access subsequently, without direct interaction between sender and recipient. Examples of dead drops can be uploads of encrypted files to public GitHub repositories, commands embedded in metadata or comments on YouTube videos, etc.
[9] A digital persona is a fabricated identity, complete with digital identifiers (names, accounts, behaviors, technical and social attributes), designed to interact credibly online for the purpose of offensive operations (cyber, disinformation, influence), infiltration of closed or clandestine communities, cover for C2 or exfiltration activities, and masking in phishing, social engineering, or credential harvesting campaigns, etc.