New Entries in the CFR Cyber Operations Tracker: Q3 2021
An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between July and October 2021.

By experts and staff
- Published
Experts
By Adam SegalIra A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program
This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program.
Kyle Fendorf, research associate for the Digital and Cyberspace Policy program, oversaw data collection and Jessie Miller, Digital and Cyberspace Policy program intern, uploaded new entries.
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between March and July 2021.
Here are some highlights:
In August, Iranian threat actor Charming Kitten used WhatsApp exploits and Android malware to spy on reformist politicians in the country.
Russian hackers launched spearphishing attacks against Slovakian diplomats by posing as the Slovakian National Security Authority.
Afghan telecommunications provider Roshan was targeted by two separate Chinese threat actors throughout 2020 and 2021, with a spike in threat actor activity detected coinciding with the U.S. withdrawal from the country in August and September 2021.
Edits to Old Entries
Mustang Panda. Added alias HoneyMyte.
Gorgon Group. Added alias Aggah.
New Entries
IndigoZebra (7/1)
Targeting of Air India (8/12)
Siamesekitten (8/18)
Calypso (9/28)
