Skip to content

New Entries in the CFR Cyber Operations Tracker: Q4 2023

An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between October and December 2023.

Cyber Operations Tracker Council on Foreign Relations

By experts and staff

Published

By

  • Kyle Fendorf
    Research Associate, Digital and Cyberspace Policy

The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between October and December 2023.

 

Here are some highlights:

  • Cybersecurity firm Kaspersky Labs released more information on an attack that occurred in June 2023, dubbed Operation Triangulation. The attackers made use of four zero-day vulnerabilities in Apple products, including a vulnerability in Apple’s hardware-based memory protections that gave the attackers kernel level access to targeted devices. The campaign ran for at least four years and targeted researchers at Kaspersky and employees of diplomatic missions and embassies inside Russia.
  • The Dukes, a Russian threat actor, use a zero-day in TeamCity, a software exchange and testing product made by the company JetBrains, to compromise the networks of hundreds of different companies and organizations. The attacks appear to have been opportunistic, with The Dukes targeting any system with JetBrains installed and escalating access in some cases.
  • Chinese hackers broke into the networks of at least twenty-four Cambodian government agencies between 2022 and 2023 and likely gained access to sensitive files across all the agencies; the agencies work on a number of issues, including national defense, human rights, election oversight, trade and commerce, and telecommunications.

Edits to Old Entries

Targeting of Russian iPhone users. Updated description, victims, and sources to reflect new information on Operation Triangulation.

New Entries

YoroTrooper (10/25)

Agrius (11/6)

Chimera (11/28)