Picture of fire at Fuerte Tiuna, Venezuela's largest military complex, after a series of explosions in Caracas on January 3, 2026. Loud explosions, accompanied by sounds resembling aircraft flyovers, were heard in Caracas around 2:00 am (0600 GMT) on January 3, an AFP journalist reported. Photo: VCG
Recently, the US launched a military strike against Venezuela and forcibly seized Venezuelan President Nicolas Maduro and his wife. According to US media reports, the operation began with cyberwarfare. Chinese cybersecurity firm Antiy released a report on Tuesday saying that the US likely conducted cyberattacks to cause widespread power outages, thereby "opening operational channels" for subsequent airstrikes and special operations.
A cybersecurity expert told the Global Times that with its cyberattack capabilities, the US typically aims to gain deep control over other countries' information systems and continuously conduct covert information gathering; during wartime, these capabilities can be converted into battlefield intelligence advantages, enabling attacks on critical infrastructure such as financial and military systems at any time, which could further lead to the collapse and disintegration of societal operations.
According to US media reports, the US side suggested that it used cyberattacks or other technical capabilities to cut power in Caracas during strikes on the Venezuelan capital. The US side also reportedly confirmed that US Cyber Command participated in the operation.
According to the latest report by Antiy, "the blackout in Caracas was largely intended to provide more covert support for the low-altitude entry and operations of [the US] helicopter fleet, requiring precision, certainty, and controllability. The likelihood of power infrastructure being compromised by firepower strikes or physical damage is relatively low, whereas cyberattacks are more likely to cause blackouts, thereby 'opening operational channels' for subsequent US airstrikes and special operations."
"It cannot be ruled out that the US attempted to disable its opponent's air defense weapon systems through cyberattacks during the operation."
The report suggests that in the US cyberwarfare against Venezuela, possible tactical moves may include breaching Venezuela's critical infrastructure and key information systems to obtain internal documents, materials, intelligence, and other information; breaching and controlling the mobile phones or terminal computers of key Venezuelan personnel to directly access information, turning these devices into mobile eavesdropping tools or stepping stones for further attacks; breaching Venezuela's security devices and smart home systems in key buildings to achieve internal reconnaissance and surveillance purposes; and breaching critical infrastructure to gain control, continuously monitor operational status, and prepare for the transition to cyberspace attacks.
Li Baisong, deputy director of the technical committee of Antiy, told the Global Times that it has long been an open secret that the US conducts extensive and indiscriminate cyberattacks and infiltrations against numerous countries, including its allies, and the recent operation against Venezuela is another example of this.
According to Li, profound changes have occurred in military technology. In the era of informatized and intelligent warfare, more effective methods are now available, such as attacks, infiltration and disruption in cyberspace, which could be used to achieve the objective of degrading or neutralizing opposing weapon systems.
Faced with the increasingly powerful cyberattack challenges from external forces, countries should strengthen cybersecurity awareness and build robust cybersecurity defense systems, Li said. "On one hand, every organization and enterprise should take on the primary responsibility for the security planning, construction, and operation of their information systems. On the other hand, and more importantly, it is essential to enhance the capability for systematic confrontation and comprehensive national defense," he said.