Skip to main content
Map
Timeline
Glossary
Methodology
Report an Incident
Report an Incident
Topics
All Topics
Defense & Security
Diplomacy & International Institutions
Economics
Energy & Environment
Health
Human Rights
Politics & Government
Social Issues
Regions
All Regions
Americas
Asia
Europe & Eurasia
Global Commons
Middle East & North Africa
Oceania
Sub-Saharan Africa
Explainers
More Explainers
Backgrounders
In Briefs
Podcasts
Videos
Timelines
Special Projects
InfoGuides
Research & Analysis
Research & Analysis
Experts
Centers & Programs
Books & Reports
Blogs
Independent Task Force Program
Fellowships
Communities
All Communities
Members
Media
Academics
Congress
State & Local Officials
Religion Leaders
Local Journalists
Events
Events
Lectureship Series
Webinars & Conference Calls
Symposia
Logo
Cyber Operations Tracker
Map
Timeline
Glossary
Methodology
Report an Incident
CFR.org
Topics
All Topics
Defense & Security
Diplomacy & International Institutions
Economics
Energy & Environment
Health
Human Rights
Politics & Government
Social Issues
Regions
All Regions
Americas
Asia
Europe & Eurasia
Global Commons
Middle East & North Africa
Oceania
Sub-Saharan Africa
Explainers
More Explainers
Backgrounders
In Briefs
Podcasts
Videos
Timelines
Special Projects
InfoGuides
Research & Analysis
Research & Analysis
Experts
Centers & Programs
Books & Reports
Blogs
Independent Task Force Program
Fellowships
Communities
All Communities
Members
Media
Academics
Congress
State & Local Officials
Religion Leaders
Local Journalists
Events
Events
Lectureship Series
Webinars & Conference Calls
Symposia
95
Result
Results
for:
Filters
Apply
Targeting of government agencies across Eastern Europe
Targeting of nuclear security experts in phishing campaign
Targeting of organizations in Brazil, Israel, and the United Arab Emirates
Targeting of 3CXDesktopApp customers and crypto firms
Targeting of the staff of Korea Risk Group, as well as organizations in the United States, Asia, and Europe
Targeting of government networks with Snake malware
Volt Typhoon
Targeting of government organizations in Eastern Europe and Western Asia
Red Menshen
Targeting of telecommunications providers across the United States, Asia, and the Middle East
Targeting of military personnel, government officials, employees of human rights and other nonprofit organizations, and students in Afghanistan, India, Pakistan, Saudi Arabia, and the United Arab Emirates (UAE)
Targeting of Albanian government
Targeting of medical professionals
Targeting of companies in Hong Kong
Targeting of Ukrainian banks and defense ministry
Targeting of Ukrainian institutions and U.S. and European foreign policy institutions and think tanks
Targeting of UK government officials
Targeting of U.S. computer retail business
Targeting of Microsoft Exchange and MySQL servers
Targeting of Afghan telecommunication firm Roshan
Take down of EMOTET botnet
Targeting of major aerospace companies in the United States, Russia, Europe, and the Middle East
Targeting of Qatari royal family
Targeting of U.S. and Australian critical infrastructure
Targeting of United Arab Emirates government employees
Targeting of Chinese cybersecurity researchers.
Hafnium
Targeting of the United Nations' human rights investigator in Yemen
Targeting of U.S. and Israeli medical researchers
Targeting of Jamal Khashoggi's wife, Hanan Elatr
Targeting of U.S. defense industry using Facebook
Targeting of the United States, Belarus, Canada, Mongolia, and Russia in an espionage operation
Targeting of experts and think tanks in the United States, Japan, and South Korea
Targeting of thirty-six Al Jazeera employees’ iPhones
Tracking of Saudi Arabian citizens in the United States
Targeting of companies in the United States, Israel, Saudi Arabia, and elsewhere
U.S. Cyber Command
Targeting of Western entities involved in COVID-19 vaccine development
Targeting of United Kingdom trade minister’s email account
Targeting of universities in the United States, Canada, Denmark, the Netherlands, Singapore, Sweden, and the United Kingdom
Targeting of U.S. government and private entities and other victims
Surveillance of individuals in the United Arab Emirates (UAE) and globally
U.S. retaliation against Iran
Targeting of European ministries
Cyber espionage by the United Arab Emirates (UAE)
Targeting of universities' maritime military secrets
Whitefly
Targeting of over sixty universities in multiple countries, including the United States and United Kingdom
Autumn Aperture—use of malicious websites to target foreign ministries and other entities
Gorgon Group
Targeting of the Organization for the Prohibition of Chemical Weapons
Iron Tiger
Attack on Italian oil firm Saipem
Winnti Umbrella
Stealth Mango and Tangelo
Thrip
UK targeting of the Islamic State group
APT 33
Bad Rabbit
Compromise of Far Eastern International Bank
Compromise of email accounts of a UK TV station
Compromise of Qatari website, leading to diplomatic rift
WannaCry
Compromise of the International Association of Athletics Federations
NotPetya
Targeting of employees of companies that operate U.S. nuclear power plants
Targeting North Korea's Reconnaissance General Bureau
Compromise the North Korean nuclear program
Denial of service incident against media websites in Sweden
Compromise of the Democratic National Committee
Compromise of the World Anti-Doping Agency
Compromise of South Korean government computers (2016)
Targeting of the Islamic State group
Prince of Persia
Emissary Panda
Compromise of United Airlines
Hellsing
Crouching Yeti
Compromise of Sony Pictures Entertainment
Sandworm
Compromise of Community Health Systems
Putter Panda
Indictment of PLA officers
Patchwork
Deep Panda
Madi
Denial of service attacks against U.S. banks in 2012–2013
Shady RAT
Shadow Network
Stuxnet
Fourth of July incident
Titan Rain
Kimusky
Targeting of CyberLink customers in supply-chain attack
APT 28
View All