To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.

From Wikipedia, the free encyclopedia

A cyberweapon is a malware agent employed for military, paramilitary, or intelligence objectives as part of a cyberattack.[1]

General characteristics

Requirements for the term vary widely; the most common criteria seem to be for a malware agent which:

Part of the distinction from other malware is that the agent is sponsored—that is, commissioned, developed, and/or used—not by a black-hat hacker or organized criminal group, but instead by a state or a non-state actor, the latter potentially including terrorist groups and other entities proposed in fourth-generation warfare (4GW) doctrines.


A cyberweapon performs an action that would normally require a soldier or spy, and which would be considered either illegal or an act of war if performed directly by a human agent of the sponsor during peacetime. Legal issues include violating the privacy of the target and the sovereignty of its host nation.[2] Such actions include (but are not limited to):

While a cyberweapon almost certainly results in either direct or indirect financial damages to the target group, direct financial gains for the sponsor (such as the transfer of funds) are not a primary objective of this class of agent.


Unlike malware used by script kiddies to organize botnets, where the ownership, physical location, and normal role of the machines attacked is largely irrelevant, cyberweapons show high selectivity in either or both of their employment and their operation. Before the attack, cyberweapons usually identify the target using different methods.[3] Likewise, malware employed by fraudsters for the theft of personal or financial information demonstrates lower selectivity and wider distribution.

Distinctions from viruses and other malware

Note that self-replication is not a requirement; as such, not all cyberweapons are viruses and not all viruses are necessarily cyberweapons[citation needed]. Without this capability, however, an alternate vector is required to get the agent onto the target system(s). Likewise, compromised access alone, such as that provided by a rootkit, is not diagnostic of the employment of a cyberweapon.[citation needed]

While the term is frequently used by the press,[4][5] some articles avoid it, instead using terms such as "internet weapon", "hack", or "virus".[6] Mainstream researchers debate the requirements of the term while still referring to the employment of the agent as a "weapon",[7] and the software development community in particular uses the term more rarely.

Probable cyberweapons

The following malware agents generally meet the criteria above, have been formally referred to in this manner by industry security experts, or have been described this way in government or military statements.

Control and disarmament

In 2017 data breaches showed that supposedly secure hacking tools used by government agencies can be obtained − and sometimes exposed − by third parties. Furthermore, it was reported that after losing control of such tools the government appears to leave "exploits open to be re-used by scammers, criminals, or anyone else − for any purpose".[8] Claudio Guarnieri, a technologist from Amnesty International states: "what we learn from the disclosures and leaks of the last months is that unknown vulnerabilities are maintained secret even after they've been clearly lost, and that is plain irresponsible and unacceptable".[8]

Also in that year WikiLeaks released the Vault 7 documents series that contain details of CIA exploits and tools with Julian Assange stating that they are working to "disarm" them before publication.[9][10] Disarmament of cyber weapons may come in the form of contacting respective software vendors with information of vulnerabilities in their products as well as potential help with or autonomous development (for open source software) of patches.

See also


  1. ^ Sheldon, John B. "Cyberwar". Encyclopedia Britannica. Retrieved 2021-04-06. Attacks can be made against the syntactic layer by using cyberweapons that destroy, interfere with, corrupt, monitor, or otherwise damage the software operating the computer systems. Such weapons include malware, […]
  2. ^ Downes, Cathy (2018). "Strategic Blind–Spots on Cyber Threats, Vectors and Campaigns". The Cyber Defense Review. 3 (1): 79–104. ISSN 2474-2120.
  3. ^ "Cyber Weapon Target Analysis". 2014-05-26.
  4. ^ "Powerful 'Flame' Cyberweapon Torching Mideast Computers : Discovery News". 2012-05-30. Retrieved 2012-12-07.
  5. ^ "Infosecurity – 2012: The Year Malware Went Nuclear". Retrieved 2012-12-07.
  6. ^ Perlroth, Nicole (2012-05-28). "Virus Infects Computers Across Middle East -". Iran: Retrieved 2012-12-07.
  7. ^ "Infosecurity – Kaspersky looks at the wreckage of Wiper malware". 2012-08-29. Retrieved 2012-12-07.
  8. ^ a b Cox, Joseph. "Your Government's Hacking Tools Are Not Safe". Motherboard. Retrieved 15 April 2017.
  9. ^ Fox-Brewster, Thomas. "Julian Assange: Wikileaks May Have Evidence CIA Spied On US Citizens". Forbes. Retrieved 15 April 2017.
  10. ^ "WikiLeaks vows to disclose CIA hacking tools; CIA to investigate". SearchSecurity. Retrieved 15 April 2017.

External links

This page was last edited on 2 June 2021, at 17:00
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.