I think it's an attack in the network/technical sense but not the strategic sense. There's a bit of a conflation of terms here because there are at least two layers to any operation like this; the system intrusion itself, and using the access to achieve some kind of real world objective. Militarily or strategically, this would just be something like reconnaissance and preparation, I think (I know almost nothing about militaries though). So it's a system attack but not an "attack-attack".