New Entries in the CFR Cyber Operations Tracker: Q2 2023
An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between April and June 2023.

By experts and staff
- Published
Kyle Fendorf is the research associate for the Digital and Cyberspace Policy program.
Natasha White, intern for the Digital and Cyberspace program, oversaw data collection.
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between April and June 2023.
Here are some highlights:
The FBI announced it had disrupted a Russian malware network, Snake, that was active in over fifty countries and had been operating in some form for at least twenty years.
A new Chinese threat actor, Volt Typhoon, was detected on U.S. military networks in Guam and other areas of the western Pacific and had established a presence in some critical infrastructure systems in the United States. The U.S. government said the group’s presence could be leveraged to attack critical infrastructure in the event of a future conflict.
North Korea’s Lazarus Group used a backdoor placed during a supply chain attack on the financial software firm Trading Technologies to access the systems of 3CX, a voice calling and video conferencing software provider, and distribute malware to 3CX customers. The attack marks the first known case of a group using access gained in an initial supply chain hack to launch a second one against a new network of customers.
Edits to Old Entries
Kimsuky. Added APT43 as an alias.
Emissary Panda. Added Budworm as an alias.
Nodaria. Added Cadet Blizzard as an alias.
New Entries
SideWinder (3/30)
Volt Typhoon (5/24)
Targeting of users of Naver (6/15)