Skip to content

New Entries in the CFR Cyber Operations Tracker: Q4 2019

An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between October and December 2019.

<p>Cyber Operations Tracker </p>
Cyber Operations Tracker Council on Foreign Relations

By experts and staff

Published

Experts

  • By Adam Segal
    Ira A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program

This blog post was coauthored by Connor Fairman, research associate for the Digital and Cyberspace Policy program.

Nathan Marx, Digital and Cyberspace Policy program intern, oversaw data collection for new entries.

The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between October 2019 and December 2019. We also modified some older entries to reflect the latest developments.

Here are some highlights:

  • The Russian cyber espionage unit Turla hijacked hacking infrastructure belonging to Iranian threat group Oilrig and used it to launch attacks in over thirty-five countries while masquerading as Iran. Russia has carried out “false flag” operations like this in the past. Last year, U.S. intelligence uncovered Russian hackers’ use of code associated with Lazarus Group, a North Korean threat actor.
  • Amnesty International released a report showing how the Moroccan government used NSO Group’s Pegasus malware to target two prominent human rights activists in Morocco. The report noted that the targeted attacks are symptomatic of a larger pattern of reprisals against human rights activists by Moroccan authorities. We also added reports of Egypt, Saudi Arabia, Uzbekistan, and United Arab Emirates using malicious software to spy on dissidents and NGOs. An increasing number of entries in the tracker are of states using commercially available and self developed malware against their political opponents.

A detailed log of the added and modified entries follow. If you know of any state-sponsored cyber incidents that should be included, you can submit them to us here

Edits to Old Entries

Mustang Panda. Added its alias Bronze President.

Newscaster. Added its aliases APT 35, Ajax Security Team, and Phosphorus.

OilRig. Added that in October 2019, Oilrig’s hacking infrastructure was revealed to have been compromised by Turla. Noted that some operations previously attributed to the group may be Turla false flags.

New Entries

Kingdom (10/1)

PKplug (10/3)

Gallium (12/12)