New Entries in the CFR Cyber Operations Tracker: Q3 2020
An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between July and September 2020.

By experts and staff
- Published
Experts
By Adam SegalIra A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program
By
- Connor FairmanResearch Associate, Digital and Cyberspace Policy Program
- Maya Villasenor
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between July 2020 and September 2020.
Here are some highlights:
- In September, Microsoft reported that Russian, Chinese, and Iranian threat actors were targeting people and organizations involved in the upcoming U.S. elections.
- For the first time, Togo is suspected of using NSO Group spyware to target opposition politicians and religious leaders. This brings the total number of nation-state attackers in the tracker to thirty-four.
- Suspected North Korean-affiliated threat actor Lazarus Group continued to compromise automated teller machines in dozens of countries to steal money through fraudulent transactions.
A detailed log of the added and modified entries follows. If you know of any state-sponsored cyber incidents that should be included, you can submit them to us here.
New Entries
Fox Kitten (2/16)
RedDelta (7/28)
Ghostwriter (7/29)
BlackTech (8/19)
Targeting of UN officials (8/28)
Pioneer Kitten (8/31)
Zirconium (9/10)
