For the First Time, EU Sanctions in Response to Cyberattacks: Enhanced Deterrence Efforts by Western Countries? | INSS
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
      • Iran and the Shi'ite Axis
        • Iran
        • The Israel–Iran War
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Cognitive Warfare
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Trackers
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Newsletter
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
New
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Iran and the Shi'ite Axis
    • Iran
    • The Israel–Iran War
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Cognitive Warfare
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
    • Contemporary Antisemitism in the United States
    • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Trackers
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Contact
  • עברית
  • Support Us
bool(false)

Publications

Home Publications INSS Insight For the First Time, EU Sanctions in Response to Cyberattacks: Enhanced Deterrence Efforts by Western Countries?

For the First Time, EU Sanctions in Response to Cyberattacks: Enhanced Deterrence Efforts by Western Countries?

The European Union announced restrictive measures against individuals and entities from China, North Korea, and Russia. The move, the first of its kind, indicates increasing cooperation among Western countries, intended to relay a deterrent message to potential attackers – and prevent future cyberattacks

INSS Insight No. 1364, August 24, 2020

עברית
Vered Zlaikha

On July 30, 2020, the European Union decided to impose restrictive measures on nine individuals and entities from China, North Korea, and Russia for their responsibility or involvement in cyberattacks. The sanctions include a travel ban, asset freeze, and prohibition to make funds available to these individuals and entities. On the political level, it seems that Western countries have managed, despite other differences, to demonstrate a coordinated approach in this field and act in cooperation. From the perspective of international cyber policy, this step seems to be in line with previous measures taken by Western countries and by the European Union itself, as well as with the cyber deterrence strategy advanced in recent years by the United States. The European Union may be seeking to send a deterrent message against cyberattacks, in particular during the Covid-19 crisis.


On July 30, 2020, the European Council announced the imposition of sanctions (“restrictive measures”) against six individuals and three entities from China, North Korea, and Russia, for their responsibility or involvement in cyberattacks or attempted cyberattacks. According to Josep Borrell, High Representative of the European Union for Foreign Affairs and Security Policy, this step was taken “in order to better prevent, discourage, deter and respond to such malicious behaviour in cyberspace.” The new sanctions were imposed in accordance with the cyber sanctions regime that was adopted by the European Union in May 2019 following the framework that has developed since 2017 for a Joint EU Diplomatic Response to Malicious Cyber Activities (the "cyber diplomacy toolbox").

Pursuant to the sanctions regime, targeted restrictive measures can be taken against cyberattacks of significant effect that pose an external threat to the EU or individual member states (or attempted cyberattacks with a potentially significant effect). Similarly, restrictive measures can also be taken in response to cyberattacks of significant effect against third states or international organizations, if deemed necessary to achieve EU common foreign and security policy objectives set out in the Treaty on European Union.

The sanctions taken include a travel ban, asset freeze, and prohibition to make funds available to these individuals and entities on the sanctions list. The targets of the sanctions are alleged to have been involved in various types of cyberattacks, most of which took place and attracted media and international attention in 2017 and 2018, as follows:

  1. A North Korean company for its alleged involvement in a series of cyberattacks, including “Wannacry,” which “disrupted information systems around the world by targeting information systems with ransomware and blocking access to data. It affected information systems of companies in the Union, including information systems relating to services necessary for the maintenance of essential services and economic activities within Member States.”
  2. Two Chinese individuals and a technological development company from China that employed them, for their alleged involvement in an attack on information systems of multinational companies in six continents, including companies located in the European Union, gaining unauthorized access to commercially sensitive data, resulting in significant economic loss (“Operation Cloud Hopper,” APT10).
  3. Four members of the Russian military intelligence officers for their alleged involvement in an attempt to gain unauthorized access to the Wi-Fi network of the OPCW (Organisation for the Prohibition of Chemical Weapons) in The Hague in April 2018. According to the sanctions list, if successful, the attack would have compromised the security of the network and the OPCW’s ongoing investigatory work. In addition, sanctions were imposed on the Main Centre for Special Technologies (GTsST) of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), for its involvement in cyberattacks according to the sanctions list, including the “NotPetya” cyberattack in June 2017, which “rendered data inaccessible in a number of companies worldwide, including in the Union, wider Europe and worldwide, by targeting computers with ransomware and blocking access to data, resulting amongst others in significant economic loss,” and for its involvement, according to the list of sanctions, in cyberattacks directed at a Ukrainian power grid in 2015 and 2016.

Most of the main incidents on the sanctions list had already resulted in public denouncements on the part of the Western countries. These included condemnations and/or indictments in some cases, with responsibility assigned to individuals or entities, or even attributed to states. The EU itself has condemned most of these incidents in public announcements, and the new sanctions in this regard appear to be a complementary step.

Soon after the sanctions were announced, the United States, the UK, Australia, and Canada expressed their support and welcomed the European Union’s step. The UK announced that the sanctions were in force in the UK as well, and mentioned the coherent autonomous UK Cyber Sanctions regime, created following Brexit, in order to implement this regime. For their part, Russia and China reportedly criticized the EU decision to impose sanctions instead of conducting a dialogue. Inter alia, the Russian Foreign Ministry stated that this was a “unilateral” measure that is “absolutely illegal in the context of international law,” and that “in diplomacy, everything is reciprocal.” The Chinese mission to the EU also expressed reservations about the step, and “urged the international community to communicate based on mutual respect and mutual benefit to safeguard cyber security.”

An initial examination of the EU step leads to some interesting observations. First, from a broad international dynamics perspective, the imposition of sanctions by the EU at the current time, supported by the US, the UK, and other Western countries, can be seen as reflecting a coordinated approach in international cyber policy from Western countries, despite differences on other matters (including Brexit arrangements, or Covid-19-related issues).

Second, these sanctions seem to be a step that goes along with the US deterrence strategy (which is a part of the National Cyber Strategy), issued by the White House in September 2018. According to this strategy, the United States will work with like-minded states “to ensure adversaries understand the consequences of their malicious cyber behavior” through a variety of deterrent response measures, including “intelligence sharing, buttressing of attribution claims, public statements of support for responsive actions taken, and joint imposition of consequences against malign actors.” The EU sanctions seem to go hand in hand with this approach, particularly taking into account that the step was preceded by condemnations and denunciations by Western countries in response to most of the incidents mentioned.

The sanctions should also be understood in the context of the broader picture of condemnations, denouncements, and imposition of responsibility during recent months in response to other cyber incidents, including: condemnation and public statements by international organizations and countries during the Covid-19 crisis in relation to cyber incidents against the healthcare sector (examples reported in the media include an attack on the computer system of a Czech hospital; an attempted attack on the World Health Organization; and commercial espionage against companies developing coronavirus vaccines); the submission of indictments in the US against two Chinese individuals for a cyber commercial espionage campaign of companies and entities in various states; and an arrest warrant issued in Germany against a Russian intelligence operative suspected of involvement in a cyberattack on the Bundestag (German parliament) in 2015, which caused leaks of sensitive correspondence.

Third, in any event, the decision to impose sanctions reflects an enhanced effort by the EU to denounce malicious cyber incidents. The sanctions are intended to send a sharp and clear message that the EU will not tolerate such activities, and that it is determined to protect itself and its member states. The imposition of sanctions at this time may reflect a strategic choice to act fiercely and to strengthen deterrence, perhaps in light of the cyberattacks against the healthcare sector during the Covid-19 crisis (and following the European Council declaration of April 2020 in that regard).

Fourth, the European Union’s step reflects a cautious approach with regard to attribution of responsibility toward specific countries, apparently for political reasons. The EU did clarify that “targeted restrictive measures have a deterrent and dissuasive effect and should be distinguished from attribution of responsibility to a third state.” The fact that statements and condemnations regarding the main cyber incidents mentioned in the sanctions list were already issued in the past by the EU probably made it easier for the EU to reach a consensus to impose concrete sanctions on those responsible. Moreover, it seems that the decision to impose sanctions regarding a group of different cyber incidents and on a variety of individuals and entities from different countries at the same time, rather than directing them at one entity, may have a softening effect. At the same time, this move can send a deterrent message of the EU willingness to impose sanctions against those involved in cyberattacks, irrespective of the source of the attack.

To sum up, the recent EU cyber sanctions are another step in shaping the cyber rules of the game and deterrence policy. They join the increasing condemnations and denunciations formulated lately by Western countries with regard to different cyber incidents (some of them launched during the pandemic). It remains to be seen how this deterrent effort will develop: what will the immediate effects of this step be like; will additional sanctions be adopted in the near future by the European Union, and for what cyber incidents; how effective would these efforts be in the long term; and would these European sanctions influence other issues on the international cyber agenda.

* Adv. Vered Zlaikha is an expert in cyber law and policy.

The opinions expressed in INSS publications are the authors’ alone.
Publication Series INSS Insight
TopicsAdvanced Technologies and National SecurityEurope
עברית

Events

All events
The 18th Annual International Conference
25 February, 2025
08:15 - 16:00

Related Publications

All publications
Ukraine’s Southern Operational Command/Telegram
Loitering Munitions (Explosive UAVs)
The confrontation states and the terrorist organizations facing Israel are arming themselves with massive quantities of loitering munitions. Their low cost and ease of use make them a significant, clear, and immediate threat—especially when launched in swarms. Addressing this challenge will require substantial investment to improve detection and neutralization capabilities. This threat analysis concludes with recommendations for countering this threat.
25/06/25
Shutterstock
Clouds of Competition—China’s Rise in the Middle East Cloud Market
China's technological presence in the Middle East is expanding – and its integration into the regional cloud market is just one of many examples. What challenges do these steps pose for Israel?
26/05/25
Rafael
Boost-Phase Interception (BPI) of Ballistic Missiles
Intercepting missiles and rockets at the earliest stage of their launch is an offensive action with a distinctly defensive character. Its goal is to prevent direct or collateral damage in the attacked state while inflicting maximum harm on the aggressor. For Israel, this interception method has a compounded advantage due to its small size, the threats posed by Iran and its proxies in both the near and far “ring of fire,” and the high potential for damage from strikes on civilian and military infrastructure. This article reviews the challenges and technological developments in missile and rocket interception, relevant geopolitical aspects, and lessons for the State of Israel.
09/03/25

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Iran and the Shi'ite Axis
      • Iran
      • The Israel–Iran War
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Cognitive Warfare
      • Economics and National Secutiry
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
  • Media

    • Communications
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat A Realcommerce company.
Accessibility Statement
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.