Cyber Threats
What types of cyberattacks and operations and which actors pose the greatest threat?
Explore this section to see which threat actors have been linked to attacks through technical, political, legal or self attribution. The tracking of the involvement of these actors helps in understanding the origin of the threat and to define relevant processes for accountability.
Through this section we document how different types of attacks are used as a means to cause destruction or disruption, to exfiltrate data or as a vector for the spread of disinformation and propaganda.
Through a dynamic timeline, you can interact with the data yourself to discover how cyberattacks have evolved as the conflict intensified.
Crunching data...