New Entries in the CFR Cyber Operations Tracker: Q2 2022
An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between March and June 2022.

By experts and staff
- Published
Experts
By Adam SegalIra A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program
This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program.
Pragya Jain, intern for the Digital and Cyberspace program, oversaw data collection and uploaded new entries.
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between March and June 2022.
Here are some highlights:
In April, the Russian-linked threat actor Sandworm targeted electrical substations in Ukraine in an attempt to disable parts of the power grid.
Mustang Panda, a threat actor linked to the Chinese government, targeted Russian government systems with a phishing campaign in April.
In June, a threat actor associated with the Indian government was accused of remotely planting evidence on over sixteen suspects’ computers, including several opponents of the ruling Bharatiya Janata Party.
Edits to Old Entries
Targeting of Asus routers. Added victim government response.
The Dukes. Added UNC2452 as an alias.
APT 10. Added TA410 as an alias.
Crouching Yeti. Added Bromine as an alias.
OilRig and Siamesekitten. Added a connection between the two groups.
New Entries
Red Menshen (5/7)
Targeting of Rostec (5/19)
Aoqin Dragon (6/9)
