Site icon Kharghar News

New Entries in the CFR Cyber Operations Tracker: Q4 2022 – Council on Foreign Relations

Climate Change
Global Climate Agreements: Successes and Failures
Backgrounder Renewing America
Myanmar
Myanmar’s Troubled History
Backgrounder
Pharmaceuticals and Vaccines
A Guide to Global COVID-19 Vaccine Efforts
Backgrounder
China
Beijing’s Global Media Offensive
Book Asia Program
Iran
Religion and Foreign Policy Webinar: The Protests in Iran
Virtual Event Religion and Foreign Policy Webinars
Economics
Prospects and Consequences of China’s Economic Slowdown
Virtual Event Greenberg Center for Geoeconomic Studies
This blog post was coauthored by Kyle Fendorf, research associate for the Digital and Cyberspace Policy program.
 
Srishti Khemka, intern for the Digital and Cyberspace program, oversaw data collection and uploaded new entries.
More on:
Cybersecurity
China
Ukraine
 
The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between October and December 2022.
 
Here are some highlights:
 
Edits to Old Entries
APT 41. Added Earth Longzhi as an alias.
APT 37. Added ScarCruft as an alias.
More on:
Cybersecurity
China
Ukraine
Mustang Panda. Added RedDelta as an alias.
Targeting of Vatican City computer networks. Added Mustang Panda under affiliations. Deleted RedDelta from affiliations.
New Entries
Targeting of Ukrainian government agencies (8/11)
Targeting of governments in the Middle East and Africa (9/29)
Targeting of Mexican journalists and human rights defenders (10/2)
Targeting of medical professionals (10/4)
Targeting of Myanmar government agencies (10/6)
Targeting of Sri Lankan government (10/12)
Targeting of Japanese crypto-asset businesses (10/14)
Targeting of companies in Hong Kong (10/18)
Targeting of Iranian citizens (10/20)
Targeting of Uyghur populations (11/10)
Targeting of Polish and Ukrainian transportation companies (11/10)
Targeting of Uyghur communities (11/10)
Targeting of Asian government agencies and certificate authorities (11/15)
Targeting of U.S. federal agency (11/21)
Targeting of Asian and Australian governments and government partners (11/18)
Targeting of the Pakistani government (11/23)
Targeting of Ukrainian local government organization (11/26)
Targeting of Chinese users with three zero days (12/2)
Targeting of U.S. COVID relief funds (12/5)
Targeting of activists at Human Rights Watch, journalists, and politicians (12/5)
Targeting of the Burmese government and passport storage systems (12/5)
Targeting of users of cryptocurrency applications (12/5)
Targeting of Citrix Systems software (12/5)
Targeting of Amnesty International Canada (12/5)
Targeting of South Korean individuals and organizations with fake Itaewon disaster documents (12/7)
Targeting of U.S. satellite network (12/16)
Targeting of European government trade departments (12/23)
Targeting of non-fungible token (NFT) owners (12/24)

source

Exit mobile version