Just a week after the Stryker wiper attack claimed by the Iranian hacker group Handala made global headlines, the U.S. Intelligence Community says its China that we should be worried about instead.
The 2026 Annual Threat Assessment, published by the Office of the Director of National Intelligence, named China, Russia, Iran, and North Korea as the four nation-state cyber actors most actively targeting U.S. government, private-sector, and critical infrastructure networks. It does not rank them by severity — it ranks them by role. And the roles are distinct.
China: Pre-Positioned, Patient and Already Inside
The IC’s assessment reserves its sharpest language for China. Beijing is the most active and persistent cyber threat to U.S. government, private-sector, and critical infrastructure networks — a designation the report pairs with a specific warning that Chinese cyber actors have already demonstrated the capability to compromise U.S. infrastructure, and they potentially maintain that access not for immediate disruption but for strategic advantage in the event of a conflict.
The distinction matters enormously for defenders. China does not primarily operate as a smash-and-grab actor. It pre-positions — meaning it establishes persistent footholds inside networks months or years before any potential military confrontation, ensuring that if tensions over Taiwan or the South China Sea escalate into open conflict, Beijing can trigger disruptions to U.S. transportation, logistics, and communications systems at a moment of its choosing. The ATA explicitly warns that a conflict over Taiwan would expose the U.S. to significant cyber attacks against its transportation sector.
“If the U.S. were to intervene (in China-Taiwan conflict), it probably would face significant but recoverable disruptions to its transportation sector from Chinese cyber attacks.”
China’s cyber ambitions also extend far beyond espionage. The report notes that Beijing continues to work to maintain U.S. dependence on sectors where it holds supply chain leverage — critical minerals, energy storage, pharmaceuticals, and unmanned aerial systems — while simultaneously accelerating its own decoupling from U.S. technology in semiconductors and artificial intelligence. The cyber program supports both these objectives. One of stealing what it needs and second of protecting what it builds.
Russia: Gray Zone Sabotage as Standard Operating Procedure
Russia’s cyber posture in the ATA reflects a different strategic logic. Unlike China’s long-horizon pre-positioning, it focuses on continuous, deniable harassment of adversaries operating in what the report calls the “gray zone” of geopolitical competition. Russia’s toolkit, the IC assesses, includes cyber attacks, disinformation and influence operations, energy market manipulation, military intimidation, and physical sabotage — all deployed beneath the threshold of declared conflict.


Russia has targeted European critical infrastructure with the explicit aim of disrupting the military supply chains that sustain Kyiv. The IC notes that Russia also has advanced counterspace capabilities, hypersonic missiles, and undersea assets designed to negate U.S. military advantages — a portfolio that its cyber operations support through intelligence collection and pre-conflict reconnaissance.
Russia’s gray zone doctrine deliberately makes attribution complicated. Moscow hides and denies its role in cyber operations, making it difficult for the U.S. and its allies to justify public responses or trigger alliance commitments. The IC warns this approach will continue, particularly as Russia leverages its partnerships with China, Iran, and North Korea to share capabilities and evade sanctions.
North Korea: A Billion-Dollar Cyber Economy Funding a Weapons Program
North Korea’s cyber program occupies a unique category. It functions simultaneously as an intelligence collection tool, a sanctions evasion mechanism, and a weapons financing engine. The IC assesses that Pyongyang’s cryptocurrency heists and other financial cybercrimes net at least $1 billion each year, with those proceeds flowing directly into the regime’s nuclear and missile programs.
Read: North Korea’s $3 Billion Mystery: UN Probes Cyberattacks Funding Nuclear Program
The report introduces a dimension that defenders increasingly face but rarely discuss publicly. North Korea’s growing use of IT workers with falsified credentials to gain employment with unwitting companies. This human insider access approach allows Pyongyang to circumvent the technical defenses that would otherwise block external intrusions. It uses a trusted insider inside the network perimeter before any exploit is needed. The IC warns this tactic specifically threatens organizations with stronger defensive measures, because it bypasses the very controls those organizations invested in building.
North Korean cyber actors are also expanding ransomware attacks against U.S. critical infrastructure and businesses — a shift from targeted espionage toward higher-volume, disruptive operations.
Iran: Degraded but Still Dangerous, and Escalating
Iran’s cyber posture, the ATA notes, faces significant constraints following the 12-Day War in 2025. The IC characterizes Iran as a threat to U.S. networks primarily through cyber espionage and attacks against poorly defended targets — but couples that assessment with an explicit warning that Iranian proxies and hacktivists outside Iran will pursue cyber-enabled operations against U.S. targets, even if less technically advanced than state-directed campaigns.
The IC noted that a hacking group linked to Iran claimed responsibility on March 11 for wiping 200,000 systems and extracting 50 terabytes of data from a U.S. medical technology company. That company was Stryker, and the attack represented, in the IC’s own words, a direct cyber retaliation for U.S. operations against Iran.
Read: Who Is Handala — The Iran-Linked Ghost Group That Just Wiped 200K Stryker Devices
Ransomware: The Non-State Accelerant
Beyond nation-states, the ATA identifies financially and ideologically motivated non-state actors like ransomware groups, cybercriminals, and hacktivists, as taking more aggressive cyber attack postures. Ransomware in particular harms U.S. critical infrastructure and business operations, generating operational disruptions, revenue loss, and sensitive data theft at scale. The IC specifically flags a tactical shift in how ransomware groups now operate faster and in high-volume. This compresses the window in which security teams have to detect and respond. The implication is that the dwell-time advantage defenders once relied on has narrowed significantly.
AI and Space: Emerging Force Multipliers for Adversaries
The ATA’s cyber threat picture cannot be read in isolation from two accelerants the report addresses separately. On artificial intelligence, the IC warns that AI already influences targeting and decision-making in active conflicts, and that China — aiming to displace the U.S. as the global AI leader by 2030 — is driving AI adoption at scale using its talent pool, extensive datasets, government funding, and global partnerships. AI’s application to offensive cyber operations, the report notes, holds significant potential to increase the autonomy, speed, and effectiveness of attacks that human operators alone could never sustain at scale.
Also read: European Space Agency Confirms Cybersecurity Breach on External Servers
On space, the IC identifies a growing convergence between cyber risk and satellite infrastructure. Adversaries are using jammers against U.S. satellites, and cyber attacks against satellite communications represent a rising threat as global reliance on digital systems expands the exploitable attack surface. Disruptive attacks against space services have become more common and, the report warns, will likely be normalized during crises or periods of strained relations between nations — a trajectory that places satellite ground systems, communication links, and the commercial constellation operators that power military logistics squarely in the crosshairs of China and Russia’s counterspace programs.
