
Summary
This article examines Paraguay’s increasing vulnerability to cyber threats within an international context defined by digitization, technological interdependence, and a reconfiguring global order. By analyzing recent cases of cyber espionage and attacks targeting critical state infrastructure, it argues that national security can no longer be understood solely in territorial terms; the digital domain is now equally central. Cyber capabilities—both defensive and offensive—have become essential components of foreign and defense policy, requiring countries like Paraguay to integrate this dimension into their security strategies and international positioning.
Keywords: Cybersecurity, cyber power, cyber espionage, international relations, Paraguay
Introduction
Recent years have seen a surge in cybersecurity incidents in Paraguay, exposing latent vulnerabilities within the state (Infobae, 2025). In an increasingly digitized and geopolitically tense international system, states face tangible risks related to information theft, espionage, and external interference. This growing digital exposure underscores the need to strengthen cybersecurity capacities as a cornerstone of state sovereignty.
Contemporary debates in international relations suggest that national defense has expanded into a new domain, where information has become as strategically valuable as natural resources or geographic positioning once were. Recent cyber intrusions, such as the Flax Typhoon infiltration of Paraguay’s Ministry of Foreign Affairs and the cyber espionage incident linked to Brazil in the context of the Itaipú negotiations (Última Hora, 2024; DW, 2025), illustrate the country’s vulnerability to threats that transcend physical borders. These cases demonstrate that sovereignty is now exercised not only over geographic territory but also across a virtual space that lacks clearly defined boundaries.
The Reconfiguration of the International System, Cyberpower, and the Expanding Concept of Frontier
The international system is undergoing a turning point characterized by structural uncertainty and an unresolved hegemonic transition. Since the end of the Cold War, the U.S.-led liberal order has faced internal erosion and external challenges, alongside China’s sustained rise, creating a highly competitive environment marked by intense power struggles and emerging influence dynamics (Ruiz, 2025).
In this context, technology has become a primary resource for accumulating and projecting power, redefining the influence capabilities of global actors. Strategic rivalry remains central to this transformation, with cyberpower emerging as a critical factor in the struggle for hegemony and in shaping the global order. Although definitions vary, Nye (2010, p.3) argues that power is context-dependent, and cyberpower derives from the resources and structures of cyberspace. Consequently, global powers now compete not only for conventional military or economic superiority but also to establish the standards, norms, and architectures that will govern the future digital ecosystem.
Traditionally, national security focused on defending physical territory from tangible invasions or military aggression. Sovereignty was defined as exclusive control over space, and threats were visible—enemy troops, aircraft, or ships crossing borders. However, the digital revolution has radically altered this paradigm. Today, borders exist not only materially but also virtually, where sovereignty is constantly challenged by anonymous state and non-state actors.
The rise of cyberspace introduces an immaterial dimension that blurs conventional boundaries of interstate competition. Influence can now be projected in unprecedented ways: a hacker serving a foreign government can infiltrate critical systems without physically entering the country; criminal groups can destabilize financial institutions from abroad; actors can manipulate public opinion; and sensitive data—from defense strategies to natural resource information—can be extracted without a single shot being fired.
International Cases of Cyber Incidents
Several cases highlight the strategic implications of cyber operations. The 2015 attack on the U.S. Office of Personnel Management (OPM) resulted in the mass leakage of sensitive data from millions of federal employees, including biometric information and security clearance forms, and was ultimately attributed to actors linked to China (Sanger & Hirschfeld Davis, 2015).
Similarly, Stuxnet (2010), the first known malware designed to sabotage critical infrastructure, targeted Iran’s nuclear program (BBC, 2015). This incident demonstrated states’ capacity to inflict tangible physical damage through cyber means, positioning cyberspace as a new strategic domain alongside terrestrial, maritime, aerial, and space domains.
In Latin America, the Snowden revelations (2013) exposed the NSA’s mass surveillance programs, highlighting the espionage of Brazil, including the state company Petrobras and communications of then-president Dilma Rousseff (Brasil de Fato, 2024). These disclosures intensified diplomatic tensions and underscored the urgent need for international frameworks regulating digital surveillance, with a focus on human rights, privacy, and civil liberties (Santoro & Borges, 2017).
Challenges for International Relations Theory
Cyber dynamics complement and, at times, redefine traditional forms of power. International Relations theory has had to adapt to cyberspace as a strategic domain, though debates persist regarding its recognition as a battlefield.
Realist perspectives struggle to categorize cyberspace as a domain equivalent to land, sea, air, or space. Nevertheless, realism recognizes cyberspace as a space for state interaction, involving both conflict and cooperation to pursue national objectives (Aguilar Antonio, 2021).
Constructivist approaches, by contrast, emphasize the role of non-state actors, such as private firms, hackers, and criminal groups, in shaping cyberspace and the international system. Nye (2010) underscores that while cyberspace does not replace physical geography or negate state sovereignty, its diffusion of power complicates governance and strategic planning.
Asymmetries, Power Diffusion, and Vulnerabilities in Cyberspace
Nye (2010) highlights that cyberspace enables a diffusion of power, reducing traditional asymmetries and allowing weaker actors to exert influence. Low barriers to entry enable technically proficient actors to compromise critical infrastructure, extract classified information, or create disproportionate social effects. Paraguay, for instance, reported nearly 200 incidents in April 2025 (Paraguay Innovation Observatory, 2025), including coordinated attacks in May 2025 affecting over ten government websites, including the Presidency and the Ministry of Health (Página 12, 2025).
This apparent democratization of power, however, paradoxically increases vulnerabilities for developing countries lacking robust institutional frameworks, cybersecurity legislation, or strategic doctrines. The speed, opacity, and sophistication of cyber threats make it difficult for such states to detect, attribute, or respond to attacks effectively.
Information as a Strategic Resource in Cyberspace
Digital technologies have dramatically expanded the scale and scope of information collection (Leung, 2015). According to Obioha Val et al. (2025), the ability to gather, process, and use information has become a strategic tool, reshaping power dynamics in international relations. Cyber espionage—the unauthorized acquisition of sensitive information for strategic, political, or economic purposes—has become a key instrument in modern diplomacy and national security.
Paraguay has been directly affected by significant cyber espionage incidents. In November 2024, MITIC and the U.S. Embassy in Asunción reported that Flax Typhoon, allegedly linked to China, had infiltrated government systems (Infobae, 2024). In March 2025, Brazil’s intelligence agency (ABIN) reportedly conducted cyber espionage targeting Paraguayan officials involved in Itaipú treaty negotiations (EFE, 2025). These events highlight Paraguay’s structural vulnerability and the urgent need for robust cybersecurity capabilities.
Conclusions
Cyberspace has become a structural component of international policy, transforming traditional notions of security, sovereignty, and influence. For Paraguay, securing digital infrastructure is critical to protecting strategic information, safeguarding institutional integrity, and maintaining international positioning.
Paraguay faces the dual challenge of strengthening cybersecurity legislation and institutional capacities while promoting a proactive digital foreign policy emphasizing international cooperation, transparency, and sovereign control of critical infrastructure. Multilateral governance, grounded in human rights, technological sovereignty, and equitable participation, is essential to ensure cyberspace serves the global good rather than unilateral interests.
References
Agencia Brasil (2025). Paraguay exige explicaciones a Brasil tras operación de espionaje. https://agenciabrasil.ebc.com.br/es/internacional/noticia/2025-04/paraguay-exige-explicaciones-brasil-tras-operacion-de-espionaje
Aguilar Antonio, J. M. (2021). Retos y oportunidades en materia de ciberseguridad de América Latina frente al contexto global de ciberamenazas a la seguridad nacional y política exterior. Estudios internacionales (Santiago), 53(198), 169-197.
BBC (2015). El virus que tomó control de mil máquinas y les ordenó autodestruirse. https://www.bbc.com/mundo/noticias/2015/10/151007_iwonder_finde_tecnologia_virus_stuxnet
Bernat, L. (2021). Enhancing the digital security of critical activities (No. 17). OECD Publishing.
Brasil de Fato (2024). US espionage: recalling when WikiLeaks revealed NSA spied on former President Dilma Rousseff and members of her government. https://www.brasildefato.com.br/2024/06/26/us-espionage-recalling-when-wikileaks-revealed-nsa-spied-on-former-president-dilma-rousseff-and-members-of-her-government/
Broeders, D. (2024). Cyber intelligence and international security: breaking the legal and diplomatic silence?, Intelligence and National Security, 39(7), 1213-1229. https://doi.org/10.1080/02684527.2024.2398077
Daniel, Carolina Dibarrat. (2022). Ciberseguridad como herramienta fundamental ante la inminente amenaza global. Revista Ensayos Militares, 8(1), 33-50.
Deeks, A. (2020, October 26). Will Cyber Autonomy Undercut Democratic Accountability? SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3719457
DW (2025). Acción de inteligencia de Brasil tensa relación con Paraguay. https://www.dw.com/es/operativo-de-inteligencia-de-brasil-tensa-relaci%C3%B3n-con-paraguay/a-72111294
EFE (2025). Paraguay convoca al embajador de Brasil tras conocerse una operación de espionaje de ese país. https://efe.com/mundo/2025-04-01/paraguay-operacion-espionaje-brasil-bolsonaro/
Infobae (2025). Gobierno paraguayo ha atendido unos 7.900 incidentes cibernéticos los últimos cinco años. https://www.infobae.com/america/agencias/2025/04/14/gobierno-paraguayo-ha-atendido-unos-7900-incidentes-ciberneticos-los-ultimos-cinco-anos/
Informe del Observatorio de Innovación de Paraguay (2025). Informe de Ciberseguridad Abril 2025. Incidentes reportados (Spam, Malware, Phishing, entre otros). https://obi.mitic.gov.py/entradas/informe-de-ciberseguridad-abril-2025-incidentes-reportados-spam-malware-phishing-entre-otros
Khan, A. W., Saeed, S., & Kakar, M. S. (2024). Cybersecurity as a geopolitical tool: The growing influence of digital warfare in statecraft. International Research Journal of Social Sciences and Humanities, 3(2), 345–357.
Kuehl, D. T. (2009). From cyberspace to cyberpower: Defining the problem. In Cyberpower and national security (pp. 30).
La Nación (2025). Investigan posible hackeo a la cuenta de X del presidente de la República. https://www.lanacion.com.py/politica/2025/06/09/investigan-posible-hackeo-a-la-cuenta-de-x-del-presidente-de-la-republica/
La Política Online (2024). China negó el ciberataque y acusó a EEUU de montar una «campaña sensacionalista». https://www.lapoliticaonline.com/paraguay/politica-py/china-nego-el-ciberataque-al-gobierno-y-acuso-a-eeuu-de-montar-una-campana-sensacionalista/
Leung, M. (2015). Cyber security Challenges in International Relations: State Responses and Global Cooperation. https://www.researchgate.net/publication/384055872
Nazareno, D. O. D. L. (2024). Ciberseguridad en las Relaciones Internacionales: ¿Cómo los ataques cibernéticos pueden crear tensiones internacionales? Cuadernos de Nuestra América, (010), 18-30.
Nye, J. S. (2010). Cyber power (pp. 1–24). Cambridge: Harvard Kennedy School, Belfer Center for Science and International Affairs.
Obioha Val, O., Olaniyi, O. O., Gbadebo, M. O., Balogun, A. Y., & Olisa, A. O. (2025). Cyber Espionage in the Age of Artificial Intelligence: A Comparative Study of State-Sponsored Campaign. SSRN. https://ssrn.com/abstract=4717710
Página 12 (2025). Paraguay sufrió un «ataque cibernético coordinado». https://www.pagina12.com.ar/825273-paraguay-sufrio-un-ataque-cibernetico-coordinado
Ruiz, J. J. (2025). Hegemonía quebrada: la rivalidad entre Estados Unidos y China en la nueva era de la política de fuerza. https://www.realinstitutoelcano.org/analisis/hegemonia-quebrada-la-rivalidad-entre-estados-unidos-y-china-en-la-nueva-era-de-la-politica-de-fuerza/
Sangery, D. E., & Hirschfeld Davis, J. (2015). Hacking Linked to China Exposes Millions of U.S. Workers. https://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html
Santoro, M., y Borges, B. (2017). Brazilian foreign policy towards internet governance. Revista Brasileira de Política Internacional, 60, e003.
Ultima Hora (2024). Ciberespionaje chino al sistema del Gobierno de Paraguay: ¿Qué datos se extrajeron? https://www.ultimahora.com/ciberespionaje-chino-al-sistema-del-gobierno-de-paraguay-que-datos-se-extrajeron