GLOBAL NETWORKS AND THE DARK WEB AS A PLATFORM FOR THE DISSEMINATION OF BIOTERRORIST CAPACITY: FROM CYBERCRIME TO BIORISK AND NATIONAL SECURITY

Authors

  • Stefcho Bankov South-West University “Neofit Rilski

Keywords:

Cyberbiosecurity; Dark Web; global networks; biorisk; bioterrorist capability; dual-use; genetic data; data breach; ransomware; national security.

Abstract

The digitalization of biology—genomic databases, automated laboratory

workflows, cloud services, and AI-enabled bioinformatics—reshapes biological security by making

it directly dependent on cyber resilience. This study examines how global digital networks and Dark

Web infrastructures can accelerate the dissemination of “bioterrorist capability” in a broad sense:

not only through potential access to hazardous materials, but through an enabling ecosystem for

dual-use knowledge, grey/illicit markets for health products, misuse of sensitive biomedical data,

and cybercriminal services that can translate into real-world biorisk. The research applies a

qualitative design combining a review of cyberbiosecurity and dual-use governance frameworks

(WHO, 2022; United States Government, 2024), analysis of publicly available institutional reports

on health-sector cyber threats and organised crime (ENISA, 2023; Europol, 2025a; Europol,

2025b), and a case study of a regulator-documented genetic data breach (ICO, 2025).

Findings highlight three converging risk pathways: (1) anonymous ecosystems can amplify

distribution channels for counterfeit or unregulated health products (Europol, 2025a); (2) genetic

and health data breaches show how biologically meaningful information becomes a tradable asset

enabling extortion, fraud, and erosion of trust (ICO, 2025); and (3) ransomware and related

incidents in healthcare can disrupt critical services and endanger patient safety, thereby manifesting

as biorisk without a biological agent (ENISA, 2023). The discussion frames these dynamics as

hybrid threats, where state and non-state actors combine cyber means, criminal networks, and

information influence below the threshold of formal warfare (NATO, n.d.; Council of the European

Union, n.d.; Europol, 2025b). The study concludes that national security should treat

cyberbiosecurity as an integrated resilience function—strengthening data protection, securing

supply chains and health/lab systems, implementing early warning, and governing dual-use in line

with non-proliferation obligations (United Nations, 2004

References

1. Council of the European Union. (n.d.). Hybrid threats (policy page).

2. ENISA. (2023). ENISA Threat Landscape: Health Sector (report).

3. Europol. (2025a). The threat of pharmaceutical crime in the EU and beyond (report).

4. Europol. (2025b). EU Serious and Organised Crime Threat Assessment 2025: The

changing DNA of serious and organised crime (EU-SOCTA 2025) (report).

5. Information Commissioner’s Office (ICO). (2025). 23andMe – Penalty notice (regulatory

document).

6. NATO. (n.d.). Countering hybrid threats (topic page).

7. United Nations. (2004). Security Council Resolution 1540 (2004) (S/RES/1540).

8. United Nations Office for Disarmament Affairs (UNODA). (n.d.). UN Security Council

Resolution 1540 (overview page).

9. United States Government. (2024). United States Government Policy for Oversight of

Dual Use Research of Concern and Pathogens with Enhanced Pandemic Potential (policy

document).

10. World Health Organization (WHO). (2022). Global guidance framework for the

responsible use of the life sciences: Mitigating biorisks and governing dual-use research

(framework).

Published

2026-05-13