CFR Cyber Operations Tracker lists 147 operations for 2022
The Digital and Cyberspace Policy program’s cyber operations tracker is a database of the publicly known state-sponsored incidents that have occurred since 2005. They have now completed entries for last year. There were 147 campaigns listed for 2022. Visit the tracker here.
- Targeting of Ukrainian and Polish military personnel
- Targeting of Russian military officials
- Targeting of Hungarian Foreign Ministry networks
- Targeting of governments in the Middle East and Africa
- Earth Lusca
- Targeting of Ukrainian state bodies
- Targeting of Ukrainian organizations with CaddyWiper
- Targeting of South Korea with multiple spear-phishing campaigns
- Targeting of U.S. federal agency
- Targeting of journalists at News Corp
- Targeting of organizations in Asia, Europe, and North America
- Targeting of Palauans via an Australian telecommunications company
- Targeting of Northwestern Polytechnical University
- Targeting of Citrix Systems software
- Targeting of Moscow Stock Exchange and Sberbank websites
- Targeting of Catalan separatists
- Targeting of pro-democracy organizations and activists in Thailand
- Targeting of medical professionals
- Targeting of Middle Eastern government institutions in phishing campaign
- Targeting of Ukrainian government officials
- Targeting of major Ukrainian broadcasting company
- Targeting of military personnel, government officials, employees of human rights and other nonprofit organizations, and students in Afghanistan, India, Pakistan, Saudi Arabia, and the United Arab Emirates (UAE)
- Targeting of Asian and Australian governments and government partners
- Targeting of Middle Eastern governments, foreign policy think tanks, and a state-affiliated airline
- Targeting of Ukrainian institutions and U.S. and European foreign policy institutions and think tanks
- Targeting of major telecommunications and network service providers
- APT 42
- Targeting of Amnesty International Canada
- Ukrainian IT Army
- Targeting of Ukrainian, Latvian, and Lithuanian computer systems
- Targeting of government, military, and energy sectors in Pakistan
- Targeting of Myanmar government agencies
- Targeting of transportation companies via UEFI firmware implant
- Targeting of Viasat's satellite broadband service
- Targeting of Ukrainian agricultural firm
- Targeting of military and public institutions in Afghanistan and several east European countries
- Targeting of Ukrainian local government organization
- Targeting of the International Atomic Energy Agency and South Korean defense contractor
- Targeting of the Indian power grid
- Aoqin Dragon
- Targeting of organizations in an Iranian ransomware campaign
- Targeting of U.S. satellite network
- Targeting of Russian diplomats in Asia
- Targeting of Ukrainian government websites
- Targeting of specialized engineering companies
- Targeting of U.S. political reporters and White House correspondents
- Targeting of Japanese crypto-asset businesses
- Targeting of German pharmaceutical and technology firms
- Targeting of American news media and IT companies
- Targeting of a Ukrainian transportation and logistics provider
- Targeting of various industries with Maui ransomware
- Targeting of the Pakistani government
- ModifiedElephant
- Targeting of Ukrainian power stations
- Targeting of telecommunications companies operating in Africa, Europe, and Southeast Asia
- Targeting of government officials in Europe, the Middle East, and South America
- Targeting of European government trade departments
- Targeting of Pakistani research institutions
- Targeting of American state governments' networks
- Targeting of Ukrainian users of Chrome, Edge, and Firefox browsers
- Targeting of the Ukrainian Azov Regiment
- Targeting of companies in Hong Kong
- Targeting of Ukrainian telecommunication company's internet service
- Red Menshen
- Targeting of Uyghur communities
- Targeting of Australian media outlet
- Targeting of telecommunication companies, internet service providers, and the data services sector
- Targeting of high-level U.S. and Israeli officials
- Targeting of Montenegrin government infrastructure
- Targeting of non-fungible token (NFT) owners
- Targeting of journalists in El Salvador
- Targeting of European diplomatic entities, research entities, and internet service providers
- Targeting of a defense and cybersecurity organization in the Baltics
- Targeting of high-profile individuals at European embassies
- Targeting of Iranian citizens
- Targeting of Ukrainian organizations and Western government entity
- Targeting of Indian government and military officials
- Targeting of telecommunications providers across the United States, Asia, and the Middle East
- Targeting of Israeli organizations using SysAid
- Targeting of U.S. COVID relief funds
- Targeting of Ukrainian banks and defense ministry
- Targeting of Axie Infinity’s Ronin Network
- Targeting of media stations such as newspapers and radio stations in Ukraine
- Targeting of an Asian IT provider
- Targeting of Asian government agencies and certificate authorities
- Targeting of Ukrainian government websites
- Targeting of Bahraini activists with Pegasus spyware
- Targeting of technology and manufacturing companies in Asia, Europe, and North America
- Targeting of the Belgian Federal Public Service Interior by Chinese threat actors
- Targeting of Sri Lankan government
- Targeting of German companies
- Targeting of Hungary's foreign ministry networks
- Targeting of Ukrainian organizations in phishing campaign
- Targeting of South Korean diplomats, professors, and researchers
- Targeting of activists at Human Rights Watch, journalists, and politicians
- Targeting of American defense contractors
- Targeting of South Korean chemical sector organizations
- Targeting of Indian activists
- Space Pirates
- Targeting of cryptocurrency start-ups
- Targeting of entities in Turkey and the Arabian Peninsula
- Targeting of diplomatic organizations in the Americas, Asia, and Europe
- Targeting of Mexican journalists and human rights defenders
- Targeting of Turkish government organizations
- Targeting of Ukrainian organizations
- Targeting of Jordanian government
- Targeting of St. Petersburg Economic Forum
- Targeting of the Burmese government and passport storage systems
- Targeting of Taiwanese financial institutions
- Targeting of UK government officials
- Targeting of Middle Eastern countries
- Targeting of nuclear security researcher
- Targeting of dissidents and opposition political candidates in Ghana
- Targeting of Ukrainian state entities
- Targeting of Russian and Belarusian websites
- Targeting of the Belgian Federal Public Service Interior in Chinese espionage campaign
- Targeting of Ukrainian government agencies
- Targeting of Palestinian entities and activists
- Targeting of government agencies in the European Union
- Targeting of Rostec
- Targeting of Albanian government
- Targeting of users of cryptocurrency applications
- Targeting of VMWare Horizon servers with Log4Shell vulnerability
- Targeting of cryptocurrency company employees
- Targeting of individual suspects in serious criminal investigations within Canada
- Targeting of Ukrainian government agencies in espionage campaign
- Targeting of Israeli activist
- Targeting of Ukrainian government and IT sector systems with WhisperGate malware
- Targeting of Belgian Defense Ministry
- Targeting of Uyghur populations
- Targeting of Jordanian activists
- Targeting of Tibetans living abroad
- Targeting of Australian, Malaysian, and European organizations and organizations operating in and around the South China Sea.
- Targeting of Latvian, Lithuanian, and Ukrainian computer systems
- Targeting of journalists reporting on North Korea
- Targeting of UN Interim Force in Lebanon (UNIFIL)
- Targeting of Ukrainian networks via fake telecommunications firms
- Targeting of local Israeli officials
- Targeting of Asus routers
- Targeting of government network in Vinnytsia, Ukraine
- Targeting of European Union (EU) member states
- Targeting of Polish and Ukrainian transportation companies
- Antlion
- Targeting of Israeli officials
- Targeting of Boston Children’s Hospital
- Targeting of industrial enterprises and public institutions in Central Asia and Eastern Europe
- Targeting of Chinese users with three zero days
tags: information operations
russia
china
iran
united states
cyber operations
cybersecurity
elections
influence