During the March 2026 Iran-related escalation, Greek firms in telecommunications, shipping, banking, transport, health, and energy were reported to be scanning their networks for cyber threats. That mattered because communications networks do not sit on the sidelines of geopolitical crises. They sit inside coordination, public messaging, commercial continuity, and the everyday digital links people and organizations rely on to function.
Communications networks are attractive in cyberwarfare because they connect technical infrastructure with human behavior. If these networks are disrupted, degraded, or even treated as unreliable, the effects can spread quickly into decision-making, service continuity, crisis response, and public confidence. Attackers do not need to strike a military system directly if they can create friction in how civilian societies communicate and coordinate.
This is why cyberwarfare keeps returning to communications infrastructure during periods of real-world tension. The issue is not only whether telecom providers themselves are hit. It is whether pressure on communications networks can create wider disruption across sectors that depend on them. The March 2026 alert environment made that logic visible again.
Why communications networks keep coming back as targets
Communications networks remain attractive in cyberwarfare because disruption here is both immediate and amplifying. If voice, data, or core connectivity becomes unreliable, the effect does not stay inside one provider. It spills into transport, banking, health, energy, logistics, and emergency coordination because those sectors all depend on communications layers to operate normally.
That wider effect is part of the appeal. Attackers do not need to cause physical destruction to create pressure if they can interfere with the infrastructure that helps people coordinate, verify information, and continue routine operations during a crisis. Even uncertainty about whether communications systems are trustworthy can produce friction and delay.
This fits the broader cyberwarfare pattern we have been documenting across the cluster. In our analysis of spillover, retaliation, and control in the Iran cyberwar, we showed how civilian-facing systems become vehicles for broader geopolitical pressure. Communications networks belong in that category because they shape how disruption spreads across many other sectors at once.
What makes communications networks strategically useful in cyberwarfare
Communications targets are strategically useful because they connect infrastructure with trust. Telecom backbones, service providers, routing layers, and supporting platforms do more than carry data. They support coordination between institutions, public messaging, remote work, customer services, and crisis response. That means a cyber incident here can create social and operational disruption without needing to destroy physical assets directly.
There is also a multiplier effect. Communications systems sit underneath many other sectors, so a disruption or loss of confidence here can complicate recovery elsewhere. That makes the impact larger than the initial point of compromise and gives attackers a way to create wider pressure through a relatively narrow intervention.
We have already seen the broader context for this in our reporting on Greek firms scanning networks as the Iran war raised cyberattack risk and in our analysis of endpoint management systems as cyberwarfare choke points. Those pieces show the same underlying logic: attackers often gain leverage by pressuring control and coordination layers rather than only the most visible frontline targets.
What defenders should prioritize in communications networks
For defenders, the priority is not only protecting customer-facing services. It is understanding which systems support core connectivity, routing, service restoration, coordination with dependent sectors, and continuity when normal communications paths become unreliable. Those are the layers where a contained cyber incident can become a wider societal problem.
It also helps to think in terms of dependency and trust. Communications providers support other critical sectors that may already be under strain during a geopolitical crisis. That means resilience planning has to account for cross-sector coordination, fallback communications, incident transparency, and the ability to operate when parts of the network or supporting management layers are degraded.
The broader lesson is simple: communications networks are not targeted only because they carry traffic. They are targeted because they carry coordination. In cyberwarfare, that makes them recurring pressure points during periods of geopolitical tension.
Communications networks remain pressure points in cyberwarfare
The March 2026 alert environment around Iran-related cyber risk reinforced a familiar reality: communications networks remain attractive because they combine coordination, trust, and cross-sector dependence. Attackers do not need to strike a military system directly when disruption in communications can generate pressure across the wider civilian environment.
That is why this sector keeps reappearing in cyberwarfare. It offers leverage through connectivity, timing, and public confidence. For defenders, the lesson is to treat communications resilience as part of the broader conflict surface, not just as a telecom operations issue.



