Go to Top

Go to Top

美 1조4천억원 ‘오펜시브 사이버 작전 예산’과 민간 파장 썸네일
美 1조4천억원 ‘오펜시브 사이버 작전 예산’과 민간 파장 썸네일
美 1조4천억원 ‘오펜시브 사이버 작전 예산’과 민간 파장 썸네일
美 1조4천억원 ‘오펜시브 사이버 작전 예산’과 민간 파장 썸네일

Security Insights

Security Insights

Security Insights

Impact of the US 1.4 trillion won 'Offensive Cyber Operations Budget' on the private sector

Impact of the US 1.4 trillion won 'Offensive Cyber Operations Budget' on the private sector

Impact of the US 1.4 trillion won 'Offensive Cyber Operations Budget' on the private sector

Kim In-soon

Kim In-soon

Jul 29, 2025

Jul 29, 2025

Jul 29, 2025

Content

Content

Content

Trump's Second Term Cybersecurity Strategy Formalized

The Trump administration's second term plans to invest a staggering $1 billion, approximately 1.4 trillion KRW of our money, in offensive cyber operations over the next four years. 

This is included in a key piece of Trump administration legislation called the ‘One Big Beautiful Bill’

From the beginning of the term, the Trump administration has focused on an aggressive cyber strategy. This is related to the intensifying cyber competition with China, Russia, Iran, and North Korea

The U.S. views China as its biggest geopolitical rival and conducts information and technology warfare in cyberspace. The strengthening of cyber warfare capabilities by Russia, Iran, and North Korea is also a focus of response efforts. 

In this competitive environment, it appears the Trump administration set this budget to clearly demonstrate that 'America can also attack, not just defend.' 


Of course, the bill does not specify the exact nature of the offensive operations or the specific tools and technologies involved. This budget is expected to be used to enhance the cyber capabilities of the United States Indo-Pacific Command, which operates in the Asia-Pacific region close to China. 


Strengthen offensive cyber operations

“We are not simply conducting 'attacks for the sake of attacks.' If we are attacked by a foreign entity, we must be able to respond in a corresponding manner and utilize cyber attacks to support traditional military operations.” 

This was stated by Alexei Bulazel, Senior Director for Cyber at the National Security Council (NSC), at the RSA Conference held in San Francisco last May. 

The strategy for an offensive cyber approach was noticed since the second Trump administration took office. 

There was a strong sentiment that the United States should not just sit back and take it. The idea was to go on the offensive and make the adversary pay a cost. 

This background particularly involved China's hacking campaigns. 

China, through operations like 'Salt Typhoon,' has hacked into several U.S. telecommunications companies. Analysis reveals that China has formed a 'staging ground' from which they can attack America's critical infrastructure at any time. 

While previous U.S. administrations hesitated to use digital attack means against adversaries, it is analyzed that the Trump administration formalized and actively used these tools. 

The term offensive cyber operations might sound vague, but in reality, they include several specific activities.

미국과 중국, 러시아, 북한, 이란 간의 사이버 전쟁을 상징하는 이미지

Zero-day vulnerabilities, spyware distribution, building attack infrastructure, collecting information and purchasing 'NetFlow' are some examples. The budget is spent on overall activities that prepare and support cyber attacks, not merely hacking.

  • Zero-day vulnerabilities
    A technique that exploits hidden flaws in software that are not known to anyone else to secretly infiltrate systems.

  • Spyware distribution
    Programs secretly installed on others' devices to extract sensitive information like emails, documents, and call records.

  • Building attack infrastructure:
    Creating and operating attack servers or systems in secret, essentially establishing a 'base of operations' for cyber attacks.

  • Collecting information and purchasing 'NetFlow'
    Includes gathering internet traffic information and even purchasing it from the market. NetFlow summarizes users' internet activity data.

The U.S. offensive cyber strategy is a policy that sends a strong message not only to the U.S.-China conflict but also to four other nations: Russia, Iran, and North Korea. 

The frontline of defense is the public

The U.S. government's investment of billions of dollars in offensive cyber operations is clearly a strategic decision from a national security perspective. The U.S.' offensive strategy affects other countries and heightens tensions in cyberspace. 

However, the repercussions fall on the risks faced by private companies. In reality, many government-sponsored hackers are hacking private companies, and many are strategically targeting private infrastructure. 

Especially organizations like small businesses, local governments, or medical institutions with weak security infrastructure can become 'unintentional victims' of inter-state cyber warfare. While the government possesses offensive capabilities, the frontline of defense remains with private companies. 

Private companies need to establish 'active and strategic security (Offensive-minded Security)' to detect and block threats in advance. 

Cyber warfare is no longer solely the domain of the military.  The government conducts attacks, but the private sector suffers the consequences. Private entities urgently need defense strategies based on the viewpoint of attackers.

Kim In-soon

Kim In-soon

Start-up College Adjunct Professor at Gachon University
Start-up College Adjunct Professor at Gachon University

Former desk member of the Electronic Newspaper ICT Convergence Department, active as a cyber security journalist and communication expert for 20 years.

Former desk member of the Electronic Newspaper ICT Convergence Department, active as a cyber security journalist and communication expert for 20 years.

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.