New Entries in the CFR Cyber Operations Tracker: Q1 2022
An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between January and March 2022.

By experts and staff
- Published
Experts
By Adam SegalIra A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program
This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program.
Jessie Miller, intern for the Digital and Cyberspace program, oversaw data collection and Kyle Fendorf, research associate for the Digital and Cyberspace Policy program, uploaded new entries.
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between January and March 2022.
Here are some highlights:
In February, Russian hackers targeted the networks of satellite internet provider Viasat and managed to bring down the service for several weeks, hindering Ukrainian military communication links.
A newly identified Chinese threat actor was detected orchestrating a long-term campaign to steal data from the Taiwanese financial sector.
Researchers discovered a new Indian threat actor which is believed to have planted evidence on an activist’s computer during his trial on terrorism charges.
Edits to Old Entries
Trisis. Assigned to Russian Federation, added indictment to read more section.
Kimsuky. Added breakdown of North Korean threat actors to read more section.
Lazarus Group. Added alias BlueNoroff. Added breakdown of North Korean threat actors to read more section.
Gamaredon. Added alias InvisiMole.
MuddyWater. Added U.S. Cyber Command analysis of malware to read more section.
New Entries
Earth Lusca (1/17)
Antlion (2/2)
ModifiedElephant (2/9)
Ukrainian IT Army (2/28)
Targeting of Asus routers (3/17)
