Skip to content

New Entries in the CFR Cyber Operations Tracker: Q3 2020

An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between July and September 2020.

<p>Cyber Operations Tracker</p>
Cyber Operations Tracker Council on Foreign Relations

By experts and staff

Published

Experts

  • By Adam Segal
    Ira A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program

By

  • Connor Fairman
    Research Associate, Digital and Cyberspace Policy Program
  • Maya Villasenor

The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between July 2020 and September 2020.

Here are some highlights:

  • In September, Microsoft reported that Russian, Chinese, and Iranian threat actors were targeting people and organizations involved in the upcoming U.S. elections.
  • For the first time, Togo is suspected of using NSO Group spyware to target opposition politicians and religious leaders. This brings the total number of nation-state attackers in the tracker to thirty-four.
  • Suspected North Korean-affiliated threat actor Lazarus Group continued to compromise automated teller machines in dozens of countries to steal money through fraudulent transactions.

A detailed log of the added and modified entries follows. If you know of any state-sponsored cyber incidents that should be included, you can submit them to us here.

New Entries 

Fox Kitten (2/16)

RedDelta (7/28)

BlackTech (8/19)

Zirconium (9/10)