Skip to content

New Entries in the CFR Cyber Operations Tracker: Q2 2023

An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between April and June 2023.

<p>Cyber Operations Tracker.</p>
Cyber Operations Tracker. Council on Foreign Relations

By experts and staff

Published

Kyle Fendorf is the research associate for the Digital and Cyberspace Policy program.

Natasha White, intern for the Digital and Cyberspace program, oversaw data collection. 

 

The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between April and June 2023. 

 

Here are some highlights: 

  • The FBI announced it had disrupted a Russian malware network, Snake, that was active in over fifty countries and had been operating in some form for at least twenty years. 

  • A new Chinese threat actor, Volt Typhoon, was detected on U.S. military networks in Guam and other areas of the western Pacific and had established a presence in some critical infrastructure systems in the United States. The U.S. government said the group’s presence could be leveraged to attack critical infrastructure in the event of a future conflict. 

  • North Korea’s Lazarus Group used a backdoor placed during a supply chain attack on the financial software firm Trading Technologies to access the systems of 3CX, a voice calling and video conferencing software provider, and distribute malware to 3CX customers. The attack marks the first known case of a group using access gained in an initial supply chain hack to launch a second one against a new network of customers. 

 

Edits to Old Entries 

Kimsuky. Added APT43 as an alias. 

Emissary Panda. Added Budworm as an alias. 

Nodaria. Added Cadet Blizzard as an alias. 

New Entries 

SideWinder (3/30) 

Volt Typhoon (5/24)