Critical Infrastructure Cybersecurity Framework
HomeCampaigns

Cyber Campaigns

Documented cyber campaigns and operations attributed to threat actors, including timeline data, targeted sectors, and associated techniques.

53
Total Campaigns
18
Critical Infrastructure
13
Years Covered
42
Target Sectors

Campaign Timeline (53 results)

C0042

Operation MidnightEclipse

Operation MidnightEclipse was a campaign exploiting vulnerabilities in Palo Alto Networks GlobalProtect to deploy backdoors on targeted systems.

2024-03-01 - 2024-04-01
UTA0218
Various
C0045

Change Healthcare Attack

Critical

The Change Healthcare attack was a ransomware incident that disrupted healthcare payment processing across the United States. The attack affected pharmacies, hospitals, and healthcare providers nationwide.

2024-02-21 - 2024-03-01
ALPHV, BlackCat
Healthcare, United States, Critical Infrastructure
C0043

Pikabot Distribution February 2024

Pikabot Distribution February 2024 was a campaign distributing Pikabot malware through malicious email campaigns following the disruption of Qakbot infrastructure.

2024-02-01 - 2024-02-28
TA577
Various
C0048

FrostyGoop Incident

Critical

The FrostyGoop Incident was a campaign targeting Ukrainian heating infrastructure using ICS-specific malware. The attack disrupted heating services during winter months.

2024-01-01 - 2024-01-31
Unknown
Energy, Ukraine, Critical Infrastructure
C0035

Cutting Edge

Cutting Edge was a campaign targeting Ivanti Connect Secure and Ivanti Policy Secure gateways using zero-day vulnerabilities. The campaign was attributed to suspected China-nexus threat actors.

2023-12-01 - 2024-01-31
UNC5221
Government, Defense, Technology
C0046

ArcaneDoor

Critical

ArcaneDoor is a campaign targeting networking devices from Cisco and other vendors between July 2023 and April 2024, primarily focused on government and critical infrastructure networks. ArcaneDoor is associated with the deployment of the custom backdoors Line Runner and Line Dancer. ArcaneDoor is attributed to a group referred to as UAT4356 or STORM-1849, and is assessed to be a state-sponsored campaign.

2023-07-01 - 2024-04-01
UAT4356
Government, Critical Infrastructure
C0039

MOVEit Transfer Attacks

Critical

The MOVEit Transfer attacks exploited a zero-day vulnerability in Progress Software's MOVEit Transfer application. The Cl0p ransomware group used this vulnerability to steal data from hundreds of organizations worldwide.

2023-05-27 - 2023-07-01
Cl0p
Government, Financial, Healthcare +1
C0041

Juicy Mix

Juicy Mix was a campaign conducted by OilRig targeting Israeli organizations using updated versions of their custom malware.

2023-02-01 - 2023-06-01
OilRig
Government, Israel
C0040

APT41 DUST

APT41 DUST was conducted by APT41 from 2023 to July 2024 against entities in Europe, Asia, and the Middle East. APT41 DUST targeted sectors such as shipping, logistics, and media for information gathering purposes. APT41 used previously-observed malware such as DUSTPAN as well as newly observed tools such as DUSTTRAP.

2023-01-01 - 2024-07-01
APT41
Shipping, Logistics, Media +2
C0047

FLORAHOX Activity

FLORAHOX Activity was a campaign targeting government and diplomatic entities using spearphishing and custom malware.

2023-01-01 - 2023-12-01
Unknown
Government, Diplomatic
C0050

J-magic Campaign

The J-magic Campaign targeted Juniper routers using a passive backdoor that could be activated by sending specially crafted packets.

2023-01-01 - 2024-01-01
Unknown
Network Infrastructure
C0057

3CX Supply Chain Attack

The 3CX Supply Chain Attack was the first publicly reported case of one supply chain compromise triggering another, leading to a cascading, two-stage intrusion. The initial supply chain attack began when a 3CX employee downloaded and executed a trojanized version of the X_Trader trading software. This provided UNC4736 access to the 3CX environment, from where they compromised the Windows and macOS build environments used to distribute the 3CX desktop application to their customers.

2022-11-01 - 2023-03-29
Lazarus Group, AppleJeus
Technology, Cryptocurrency, Defense
C0034

2022 Ukraine Electric Power Attack

Critical

The 2022 Ukraine Electric Power Attack was a Sandworm Team campaign that used a combination of GOGETTER, Neo-REGEORG, CaddyWiper, and living off the land (LotL) techniques to gain access to a Ukrainian electric utility to send unauthorized commands from their SCADA system.

2022-10-10 - 2022-10-10
Sandworm Team
Energy, Ukraine
C0027

C0027

C0027 was a campaign conducted by Scattered Spider that targeted telecommunications and technology companies using social engineering and SIM swapping techniques.

2022-09-01 - 2023-01-01
Scattered Spider
Telecommunications, Technology
C0038

HomeLand Justice

HomeLand Justice was a campaign targeting Albanian government organizations using ransomware and wiper malware. The campaign was attributed to Iranian threat actors.

2022-07-01 - 2022-09-01
Moses Staff
Government, Albania
C0026

C0026

C0026 was a campaign conducted by Scattered Spider targeting telecommunications and business process outsourcing companies.

2022-06-01 - 2022-12-01
Scattered Spider
Telecommunications, Business Services
C0021

C0021

C0021 was a campaign conducted by Mustang Panda that targeted government and non-governmental organizations in Southeast Asia and Europe.

2022-03-01 - 2022-10-01
Mustang Panda
Government, Non-profit, Southeast Asia +1
C0051

APT28 Nearest Neighbor Campaign

APT28 Nearest Neighbor Campaign was conducted by APT28 from early February 2022 to November 2024 against organizations and individuals with expertise on Ukraine. APT28 primarily leveraged living-off-the-land techniques, while leveraging the zero-day exploitation of CVE-2022-38028. Notably, APT28 leveraged Wi-Fi networks in close proximity to the intended target to gain initial access to the victim environment.

2022-02-01 - 2024-11-01
APT28
Government, Defense, Ukraine
C0018

C0018

C0018 was a month-long ransomware intrusion that successfully deployed AvosLocker onto a compromised network. The unidentified actors gained initial access to the victim network through an exposed server and used a variety of open-source tools.

2022-02-01 - 2022-03-01
Unknown
Unknown
C0044

KV Botnet Activity

Critical

KV Botnet Activity was a campaign using compromised SOHO routers and VPN devices to create a botnet for proxying malicious traffic. The campaign was attributed to Volt Typhoon.

2022-02-01 - 2024-01-01
Volt Typhoon
Critical Infrastructure, United States
C0011

C0011

C0011 was a suspected cyber espionage campaign conducted by Transparent Tribe that targeted students at universities and colleges in India. Security researchers noted this campaign against students was a significant shift from Transparent Tribe's historic targeting of Indian government, military, and think tank personnel.

2022-01-01 - 2022-07-01
Transparent Tribe
Education, India
C0033

C0033

C0033 was a campaign that targeted organizations using Poseidon Group's custom malware and social engineering techniques.

2022-01-01 - 2022-06-01
Poseidon Group
Financial, Government
C0052

Leviathan Australian Intrusions

Leviathan Australian Intrusions was a campaign targeting Australian organizations in the defense, government, and maritime sectors.

2022-01-01 - 2023-06-01
Leviathan, APT40
Defense, Government, Maritime +1
C0032

C0032

C0032 was a campaign conducted by LAPSUS$ targeting major technology companies through social engineering and credential theft.

2021-12-01 - 2022-09-01
LAPSUS$
Technology, Gaming
C0015

C0015

C0015 was a ransomware intrusion during which the unidentified attackers used Bazar, Cobalt Strike, and Conti, along with other tools, over a 5 day period. Security researchers assessed the actors likely used the widely-circulated Conti ransomware playbook based on the observed pattern of activity and operator errors.

2021-08-01 - 2021-08-05
Unknown
Unknown
C0037

Kaseya VSA Attack

The Kaseya VSA attack was a supply chain ransomware attack that exploited vulnerabilities in Kaseya's VSA remote management software. The attack affected up to 1,500 organizations worldwide.

2021-07-02 - 2021-07-05
REvil
Technology, Various
C0031

JBS Foods Attack

Critical

The JBS Foods attack was a ransomware incident targeting the world's largest meat processing company. The attack disrupted operations in the United States, Canada, and Australia.

2021-05-30 - 2021-06-03
REvil
Food and Agriculture, Critical Infrastructure
C0030

Colonial Pipeline

Critical

The Colonial Pipeline attack was a ransomware incident that forced the shutdown of the largest fuel pipeline in the United States. The attack was conducted by DarkSide ransomware operators and led to fuel shortages across the southeastern United States.

2021-05-07 - 2021-05-12
DarkSide
Energy, United States, Critical Infrastructure
C0017

C0017

C0017 was an APT41 campaign conducted between May 2021 and February 2022 that successfully compromised at least six U.S. state government networks through the exploitation of vulnerable Internet facing web applications. During C0017, APT41 was quick to adapt and use publicly-disclosed as well as zero-day vulnerabilities for initial access.

2021-05-01 - 2022-02-01
APT41
Government, United States
C0024

Outer Space

Outer Space was a campaign conducted by OilRig targeting Israeli organizations using updated versions of their Solar backdoor.

2021-01-01 - 2022-01-01
OilRig
Government, Israel
C0016

Volt Typhoon

Critical

Volt Typhoon is a campaign attributed to a China-nexus threat actor that has been targeting U.S. critical infrastructure organizations. The campaign uses living-off-the-land techniques and focuses on pre-positioning for potential disruptive operations.

2021-01-01 - 2024-02-01
Volt Typhoon
Critical Infrastructure, Government, United States
C0010

C0010

Critical

C0010 was a cyber espionage campaign conducted by UNC3890 that targeted Israeli shipping, government, aviation, energy, and healthcare organizations. Security researchers assess UNC3890 conducts operations in support of Iranian interests.

2020-12-01 - 2022-06-01
UNC3890
Shipping, Government, Aviation +3
C0022

Operation Dream Job

Operation Dream Job was a campaign conducted by Lazarus Group targeting defense and aerospace employees with fake job offers. The campaign used LinkedIn and other platforms to deliver malware.

2020-08-01 - 2021-12-01
Lazarus Group
Defense, Aerospace
C0004

SolarWinds Compromise

The SolarWinds Compromise was a sophisticated supply chain attack attributed to APT29 (NOBELIUM) that compromised the SolarWinds Orion software build process. The attack affected approximately 18,000 organizations including U.S. government agencies and major corporations.

2020-03-01 - 2020-12-13
APT29
Government, Technology, United States
C0049

Indian Critical Infrastructure Intrusions

Critical

Indian Critical Infrastructure Intrusions was a campaign targeting Indian power grid organizations. The campaign used sophisticated techniques to maintain persistent access to critical systems.

2020-01-01 - 2021-03-01
RedEcho
Energy, India, Critical Infrastructure
C0019

Operation Spalax

Operation Spalax was a campaign targeting Colombian government and private companies using commodity RATs and spearphishing.

2020-01-01 - 2021-01-01
Unknown
Government, Colombia
C0001

CostaRicto

CostaRicto is a suspected hack-for-hire campaign that has targeted multiple industries worldwide since at least 2019. The campaign uses custom malware and sophisticated techniques to maintain persistence.

2019-10-01 - 2020-11-01
Unknown
Financial, Technology, Retail
C0007

Frankenstein

Frankenstein was a campaign that leveraged four different open-source techniques to create a sophisticated attack chain. The campaign targeted various organizations using a combination of publicly available tools.

2019-01-01 - 2019-04-01
Unknown
Various
C0012

Operation CuckooBees

Operation CuckooBees was a campaign conducted by APT41 targeting technology and manufacturing companies to steal intellectual property and sensitive data.

2019-01-01 - 2022-05-01
APT41
Technology, Manufacturing
C0023

Operation Ghost

Operation Ghost was a campaign conducted by APT29 targeting European diplomatic entities using sophisticated malware and steganography techniques.

2019-01-01 - 2019-10-01
APT29
Government, Diplomatic, Europe
C0036

Operation Triangulation

Operation Triangulation was a sophisticated campaign targeting iOS devices using zero-click exploits delivered via iMessage. The campaign was discovered by Kaspersky researchers on their own corporate network.

2019-01-01 - 2023-06-01
Unknown
Technology, Various
C0008

FunnyDream

FunnyDream was a campaign that targeted Southeast Asian governments using custom backdoors and sophisticated persistence mechanisms.

2018-11-01 - 2020-08-01
Unknown
Government, Southeast Asia
C0013

Operation Sharpshooter

Critical

Operation Sharpshooter was a campaign targeting defense, energy, and financial organizations using sophisticated malware and techniques associated with Lazarus Group.

2018-10-01 - 2019-01-01
Lazarus Group
Defense, Energy, Financial
C0014

Operation Honeybee

Operation Honeybee was a campaign targeting humanitarian aid organizations using spearphishing and custom malware.

2018-01-01 - 2018-03-01
Unknown
Non-profit, Humanitarian
C0009

Triton Safety Instrumented System Attack

Critical

The Triton attack targeted a petrochemical facility in Saudi Arabia, attempting to disable safety instrumented systems (SIS) that protect against catastrophic failures. This was one of the first known attacks specifically designed to cause physical damage to industrial facilities.

2017-08-01 - 2017-12-01
XENOTIME
Energy, Saudi Arabia, Critical Infrastructure
C0029

NotPetya

NotPetya was a destructive wiper malware campaign disguised as ransomware that primarily targeted Ukrainian organizations but spread globally. The attack caused over $10 billion in damages worldwide and is considered one of the most destructive cyberattacks in history.

2017-06-27 - 2017-06-28
Sandworm Team
Various, Ukraine
C0020

WannaCry

Critical

WannaCry was a global ransomware campaign that exploited the EternalBlue vulnerability to spread rapidly across networks. The attack affected over 200,000 computers in 150 countries and caused billions of dollars in damages.

2017-05-12 - 2017-05-15
Lazarus Group
Healthcare, Government, Various
C0005

Operation Wocao

Operation Wocao was a campaign conducted by APT20 targeting government and managed service providers to steal sensitive data and maintain persistent access.

2017-01-01 - 2019-12-01
APT20
Government, Technology
C0025

2016 Ukraine Electric Power Attack

Critical

The 2016 Ukraine Electric Power Attack was a Sandworm Team campaign during which they used Industroyer malware to target and disrupt distribution substations within the Ukrainian power grid. This campaign was the second major public attack conducted against Ukraine by Sandworm Team and demonstrated advanced capabilities to manipulate industrial control systems.

2016-12-17 - 2016-12-17
Sandworm Team
Energy, Ukraine
C0028

2015 Ukraine Electric Power Attack

Critical

The 2015 Ukraine Electric Power Attack was a Sandworm Team campaign during which they used BlackEnergy (specifically BlackEnergy3) and KillDisk to target and disrupt transmission and distribution substations within the Ukrainian power grid. This campaign was the first major public attack conducted against the Ukrainian power grid by Sandworm Team, resulting in power outages affecting approximately 225,000 customers.

2015-12-23 - 2015-12-23
Sandworm Team
Energy, Ukraine
C0006

Operation Dust Storm

Operation Dust Storm was a campaign targeting Japanese organizations in the defense, utilities, and financial sectors. The campaign used sophisticated malware and persistence techniques.

2010-01-01 - 2016-02-01
Unknown
Defense, Utilities, Financial +1
C0003

Night Dragon

Critical

Night Dragon was a campaign targeting global oil, gas, and petrochemical companies. The campaign used social engineering, spearphishing, and exploitation of Windows systems to steal sensitive data.

2009-11-01 - 2011-02-01
Night Dragon
Energy, Oil and Gas
C0002

Maroochy Water Breach

Critical

The Maroochy Water Breach was one of the first publicly known cyberattacks on critical infrastructure. A disgruntled former employee used stolen equipment and insider knowledge to release millions of liters of raw sewage into local waterways in Queensland, Australia.

2000-01-01 - 2000-04-01
Insider
Water, Australia, Critical Infrastructure

Select a Campaign

Click on a campaign from the list to view detailed information including timeline, attribution, and techniques used.

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.