New Entries in the CFR Cyber Operations Tracker: Q4 2021
An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between October and December 2021.

By experts and staff
- Published
Experts
By Adam SegalIra A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program
This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program.
Jessie Miller, intern for the Digital and Cyberspace program, oversaw data collection and Kyle Fendorf, research associate for the Digital and Cyberspace Policy program, uploaded new entries.
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between October and December 2021.
Here are some highlights:
In November, North Korean hackers broke into the servers used by Chinese cyberespionage groups to steal toolkits and exploits.
The Polish government was accused of installing NSO Group’s Pegasus spyware on the phones of several opposition politicians in 2019, including a prominent contender for the presidency.
The Iranian threat actor Charming Kitten was one of the first state-sponsored groups to leverage the Log4Shell vulnerability in December, when it used the vulnerability to gain access to the networks of several Israeli government agencies.
New Entries
MalKamak (10/6)
Targeting of REvil (10/18)
UNC1151 (11/16)
Emennet Pasargad (11/18)
Targeting of Asian airline (12/15)
