Skip to content

New Entries in the CFR Cyber Operations Tracker: Q2 2022

An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between March and June 2022. 

Cyber Operations Tracker. Council on Foreign Relations

By experts and staff

Published

Experts

  • By Adam Segal
    Ira A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program

This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program. 

 

Pragya Jain, intern for the Digital and Cyberspace program, oversaw data collection and uploaded new entries. 

 

The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between March and June 2022. 

 

Here are some highlights: 

  • In April, the Russian-linked threat actor Sandworm targeted electrical substations in Ukraine in an attempt to disable parts of the power grid. 

  • Mustang Panda, a threat actor linked to the Chinese government, targeted Russian government systems with a phishing campaign in April. 

  • In June, a threat actor associated with the Indian government was accused of remotely planting evidence on over sixteen suspects’ computers, including several opponents of the ruling Bharatiya Janata Party. 

 

Edits to Old Entries 

Targeting of Asus routers. Added victim government response. 

The Dukes. Added UNC2452 as an alias. 

APT 10. Added TA410 as an alias. 

Crouching Yeti. Added Bromine as an alias. 

OilRig and Siamesekitten. Added a connection between the two groups. 

New Entries 

Red Menshen (5/7) 

Aoqin Dragon (6/9)