Skip to content

New Entries in the CFR Cyber Operations Tracker: Q3 2023

An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between July and September 2023.

<p>Cyber Operations Tracker.</p>
Cyber Operations Tracker. Council on Foreign Relations

By experts and staff

Published
  • Kat DuffyCFR Expert
    Senior Fellow for Digital and Cyberspace Policy

The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between July and September 2023.

 

Here are some highlights:

  • Chinese threat actor Mirage distributed trojanized versions of the messaging apps Signal and Telegram to Uyghurs living outside of China. The malicious apps were downloaded at least thirteen thousand times.
  • A North Korean threat actor, APT 37, broke into the systems of Russian missile design firm NPO Mashinostroyeniya and may have stolen important intellectual property. The firm has previously been involved in designing both newer generation ballistic missiles and hypersonic missiles.
  • Charming Kitten, an Iranian hacking group, sent phishing emails to nuclear security experts in the United States and Western Europe, likely to learn more about ongoing negotiations over the Joint Comprehensive Plan of Action, commonly referred to as the Iran nuclear deal.

 

Edits to Old Entries

APT 33. Added Holmium and Peach Sandstorm as aliases.

Targeting of Northwestern Polytechnical University. Added indicators of compromise to sources.

Tick. Added TAG-74 as an alias.

 

New Entries