It must be cautioned that it can be challenging for a target State to distinguish cyber espionage activities from other cyber operations, including offensive cyber operations. For example, both cyber espionage and offensive cyber operations usually require penetration of a system, often by the introduction of malware or a successful phishing operation.