New Entries in the CFR Cyber Operations Tracker: Q2 2021
An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between March and July 2021.

By experts and staff
- Published
Experts
By Adam SegalIra A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program
This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program.
Kyle Fendorf, research associate for the Digital and Cyberspace Policy program, oversaw data collection and Jessie Miller, Digital and Cyberspace Policy program intern, uploaded new entries.
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between March and July 2021.
Here are some highlights:
In April, Chinese hackers targeted a Russian submarine design firm with spearphishing attacks with the aim of stealing nuclear submarines schematics.
Dutch police investigating the downing of Malaysian Airlines Flight MH17 were hacked by Russian intelligence services in 2017.
In June, a new Chinese threat actor was identified running a long-term espionage campaign targeting former Soviet republics in Central Asia.
A detailed log of the added and modified entries follows. If you know of any state-sponsored cyber incidents that should be included, you can submit them to us here.
Edits to Old Entries
Gamaredon. Added alias Primitive Bear.
TempTick. Added alias Tick and updated description.
New Entries
RedFoxTrot (6/16)
UNC1151 (4/28)
