This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program.
Jessie Miller, intern for the Digital and Cyberspace program, oversaw data collection and Kyle Fendorf, research associate for the Digital and Cyberspace Policy program, uploaded new entries.
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between October and December 2021.
Here are some highlights:
In November, North Korean hackers broke into the servers used by Chinese cyberespionage groups to steal toolkits and exploits.
The Polish government was accused of installing NSO Group’s Pegasus spyware on the phones of several opposition politicians in 2019, including a prominent contender for the presidency.
The Iranian threat actor Charming Kitten was one of the first state-sponsored groups to leverage the Log4Shell vulnerability in December, when it used the vulnerability to gain access to the networks of several Israeli government agencies.
Targeting of REvil (10/18)
Emennet Pasargad (11/18)
Targeting of Asian airline (12/15)