Skip to content

New Entries in the CFR Cyber Operations Tracker: Q4 2020

An update of the Council on Foreign Relations’ Cyber Operations Tracker for the period between October and December 2020.

Cyber Operations Tracker Council on Foreign Relations

By experts and staff

Published

Experts

  • By Adam Segal
    Ira A. Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program

This blog post was coauthored by Connor Fairman, research associate for the Digital and Cyberspace Policy program.

Eyako Heh, Digital and Cyberspace Policy program intern, oversaw data collection and uploaded new entries. 

The Cyber Operations Tracker has just been updated. This update includes the state-sponsored incidents and threat actors that have been made public between October and December 2020.

Here are some highlights:

  • In October, U.S. Cyber Command launched a cyberattack to take down parts of the Russian botnet Trickbot. U.S. officials were concerned that the botnet could have infected election systems with ransomware ahead of the 2020 U.S. presidential election.
  • For the second time, China has been accused of spying on the African Union’s headquarters. This time, security footage was reportedly obtained, granting hackers visual access to meeting rooms, hallways, and parking lots.
  • In December, FireEye revealed a massive Russian compromise of SolarWinds’ Orion platform that has affected an estimated minimum of 18,000 victims.

A detailed log of the added and modified entries follows. If you know of any state-sponsored cyber incidents that should be included, you can submit them to us here.

Edits to Old Entries

Emissary Panda. Added alias LuckyMouse.

New Entries

Cerium (11/13)

Zinc (11/13)