{"id":43597,"date":"2021-10-25T16:00:17","date_gmt":"2021-10-25T16:00:17","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=96900"},"modified":"2021-10-25T16:00:17","modified_gmt":"2021-10-25T16:00:17","slug":"microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/","title":{"rendered":"Microsoft Digital Defense Report shares new insights on nation-state attacks"},"content":{"rendered":"<p>Microsoft is proud to promote <a href=\"https:\/\/www.microsoft.com\/en-us\/securitynow\" target=\"_blank\" rel=\"noopener\">Cybersecurity Awareness Month<\/a> as part of our ongoing commitment to <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noopener\">security for all<\/a>. Year-round, Microsoft tracks nation-state threat activities to help protect organizations and individuals from these advanced persistent actors. We\u2019re constantly improving our capabilities to bring better detections, threat context, and actor knowledge to our customers so they can improve their own defenses. To learn more about how Microsoft responds to nation-state attacks and how to defend your organization, watch the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/nation-state-attacks#office-ContentAreaHeadingTemplate-hkzu7ix\" target=\"_blank\" rel=\"noopener\">Decoding NOBELIUM docuseries<\/a>. Hear directly from the frontline defenders who helped protect organizations against the most sophisticated attack in history.<\/p>\n<p>The aims of nation-state cyber actors\u2014largely espionage and disruption\u2014remain consistent, along with their most reliable tactics and techniques: credential harvesting, malware, and VPN exploits. However, a common theme this year among the actors originating from China, Russia, North Korea, and Iran has been increased targeting of IT service providers as a way of exploiting downstream customers.<sup>1<\/sup><\/p>\n<p>Earlier this month, we published the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-intelligence-report\" target=\"_blank\" rel=\"noopener\">2021 Microsoft Digital Defense Report<\/a> (MDDR), which provides more in-depth findings about Microsoft\u2019s tracking of nation-state threat groups, including information on the most heavily targeted sectors and countries, specific threat actors, attack methods, and more. This blog captures the high-level themes from the MDDR, and we encourage you to download the full report for additional details.<\/p>\n<h2>Government agencies and non-governmental organizations are favored targets<\/h2>\n<p>Whenever an organization or individual account holder is targeted or compromised by observed nation-state activities, Microsoft delivers a nation-state notification (NSN) directly to that customer to give them the information they need to investigate the activity. Over the past three years, we\u2019ve delivered over 20,500 NSNs. According to the analysis of the actor activity behind these NSNs, nation-state attacks in the past year have largely focused on operational objectives of espionage and intelligence collection rather than destructive attacks.<\/p>\n<blockquote>\n<p><em>\u201cNation-state activity spans nearly every industry sector and geographic region. In other words, protections against these tactics are critical for every organization and individual.\u201d<\/em>\u20142021 Microsoft Digital Defense Report.<\/p>\n<\/blockquote>\n<p>The <a href=\"https:\/\/www.microsoft.com\/security\/blog\/microsoft-security-intelligence\/\" target=\"_blank\" rel=\"noopener\">Microsoft Threat Intelligence Center<\/a> (MSTIC) and the <a href=\"https:\/\/news.microsoft.com\/on-the-issues\/2021\/04\/15\/how-microsofts-digital-crimes-unit-fights-cybercrime\/\" target=\"_blank\" rel=\"noopener\">Microsoft Digital Crimes Unit<\/a> (DCU) have observed that <strong>nearly 80 percent of nation-state attacks were directed against government agencies, think tanks, and non-government organizations<\/strong> (NGOs). The nation-state groups we refer to as NOBELIUM, NICKEL, THALLIUM, and PHOSPHORUS were the most active against the government sector, targeting mostly government entities involved in international affairs.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-99453 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture1-6170a1fdb2cd7.png\" alt=\"The most targeted sectors between July 2020 and June 2021 were Government (48 percent) and NGOs and Think Tanks (31 percent).\" width=\"2049\" height=\"1388\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture1-6170a1fdb2cd7.png 2049w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture1-6170a1fdb2cd7-300x203.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture1-6170a1fdb2cd7-1024x694.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture1-6170a1fdb2cd7-768x520.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture1-6170a1fdb2cd7-1536x1040.png 1536w\" sizes=\"auto, (max-width: 2049px) 100vw, 2049px\"><\/p>\n<p><em>Figure 1: Sectors targeted by nation-state attacks (July 2020 to June 2021).<\/em><\/p>\n<p>Russia-based cyber attackers in particular have increasingly set their sights on government targets. Year-on-year comparisons of NSN data depict a marked increase in successful compromises, from a 21 percent success rate between July 2019 and June 2020, up to 32 percent since July 2020. In turn, the percentage of government organizations targeted by Russian threat actors exploded from roughly 3 percent last year, to 53 percent since July 2020 (see figure 3).<\/p>\n<h2>Most-targeted countries<\/h2>\n<p>The United States remained the most highly targeted country in the past year. Russia-based NOBELIUM also heavily targeted Ukraine, particularly focusing on government interests involved in rallying against a build-up of Russian troops along Ukraine\u2019s border\u2014driving the number of Ukrainian customers impacted from 6 last year to more than 1,200 this year. This past year also saw a near quadrupling in the targeting of Israeli entities, driven exclusively by Iranian actors as tensions escalated between the two countries.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-99456 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7.png\" alt=\"The most targeted countries between July 2020 and June 2021 were the United States (46 percent), Ukraine (19 percent), and the United Kingdom (9 percent).\" width=\"2125\" height=\"1388\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7.png 2125w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7-300x196.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7-1024x669.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7-768x502.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7-1536x1003.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7-2048x1338.png 2048w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture2-6170a23006fb7-200x130.png 200w\" sizes=\"auto, (max-width: 2125px) 100vw, 2125px\"><\/p>\n<p><em>Figure 2: Countries most targeted (July 2020 to June 2021).<\/em><\/p>\n<p>Microsoft identifies nation-state activities by chemical element names, some of which are shown in the table below, along with their countries of origin. This small sample of the total nation-state actors tracked by Microsoft represents several of the most active in the last year.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-99264 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/nation-state-actors-map.png\" alt=\"Reference map for the nation state activity groups discussed in this report, including country of origin and common targets.\" width=\"1281\" height=\"659\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/nation-state-actors-map.png 1281w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/nation-state-actors-map-300x154.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/nation-state-actors-map-1024x527.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/nation-state-actors-map-768x395.png 768w\" sizes=\"auto, (max-width: 1281px) 100vw, 1281px\"><\/p>\n<p><em>Figure 3: Reference map for nation-state actors.<\/em><\/p>\n<h2>Volume versus precision<\/h2>\n<p>Rates of successful compromises varied widely among threat groups this year. Some, such as North Korea-based THALLIUM, had a low rate of successful compromise likely because their common tactic of large-scale <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\" target=\"_blank\" rel=\"noopener\">spear-phishing campaigns<\/a> has become easier to detect and deter as users become increasingly aware of these lures and organizations use security solutions to detect them more effectively. Russia-based NOBELIUM, in contrast, had more successful compromises as a result of their more targeted attack against software supply chains coupled with more high-volume password spray campaigns in pursuit of credential theft. Nation-state actors appear to be increasing the scale of these blunt attacks in an attempt to evade detection and improve their chances of a successful breach. The first fiscal quarter of 2020 (July to September) saw a proportionally higher compromise rate; not necessarily because threat actors were more successful, but because we saw fewer high-volume campaigns during this time.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-99459 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture3-6170a4d37a0de.png\" alt=\"The targeted entities were compromised 78 percent of the time in July through September of 2020. The annual average for July 2020 through June 2021 was 28 percent.\" width=\"2149\" height=\"1473\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture3-6170a4d37a0de.png 2149w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture3-6170a4d37a0de-300x206.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture3-6170a4d37a0de-1024x702.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture3-6170a4d37a0de-768x526.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture3-6170a4d37a0de-1536x1053.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/10\/Picture3-6170a4d37a0de-2048x1404.png 2048w\" sizes=\"auto, (max-width: 2149px) 100vw, 2149px\"><\/p>\n<p><em>Figure 4: Average rates of compromise (all tactics, July 2020 to June 2021).<\/em><\/p>\n<h2>Snapshot: Nation-state activity<\/h2>\n<h3>Russia<\/h3>\n<p><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/05\/27\/nobelium-cyberattack-nativezone-solarwinds\/\" target=\"_blank\" rel=\"noopener\">Russia-based NOBELIUM<\/a> proved how insidious software <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/supply-chain-malware\" target=\"_blank\" rel=\"noopener\">supply chain attacks<\/a>&nbsp;can be with its devastating compromise of the SolarWinds Orion software update.<sup>2<\/sup>&nbsp;Although the group limited its follow-up exploitation to approximately 100 organizations, its backdoor malware was pushed to roughly 18,000 entities worldwide. In other incidents, NOBELIUM has employed password spray and phishing attacks to compromise third-party providers and facilitate future compromises. This threat actor targeted cloud solution providers (CSPs) and leveraged the backdoor to steal a Mimecast private key.<sup>3<\/sup>&nbsp;Get the full account from world-class defenders on what it took to respond to the most advanced nation-state attack in history by watching the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/nation-state-attacks#office-ContentAreaHeadingTemplate-hkzu7ix\" target=\"_blank\" rel=\"noopener\">Decoding NOBELIUM docuseries<\/a>.<\/p>\n<h3>China<\/h3>\n<p>Chinese nation-state threat actors have been targeting the United States political landscape for insight into policy shifts. In early March 2021, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\" target=\"_blank\" rel=\"noopener\">Microsoft blogged about HAFNIUM<\/a> and the detection of multiple zero-day exploits used to attack on-premises versions of <a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/exchange-server?view=exchserver-2019\" target=\"_blank\" rel=\"noopener\">Microsoft Exchange Server<\/a>. HAFNIUM operates primarily from leased virtual private servers in the United States and targets entities across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs.<\/p>\n<h3>Iran<\/h3>\n<p>Iran continued its streak of destructive cyberattacks against regional adversaries, including a string of ransomware attacks against Israeli entities. Iran-linked threat actor RUBIDIUM has been implicated in the Pay2Key<sup>4<\/sup>&nbsp;and N3tw0rm<sup>5<\/sup>&nbsp;ransomware campaigns that targeted Israel in late 2020 and early 2021. A common element in Iranian nation-state cyberattacks was the targeting of Israeli logistics companies involved in maritime transportation. Despite Tehran\u2019s less aggressive approach toward the United States in the wake of last year\u2019s election, United States entities remained Iranian threat actors\u2019 top target, comprising nearly half of the NSNs Microsoft delivered to cloud-service customers.<\/p>\n<h3>North Korea<\/h3>\n<p>Just over half the NSNs Microsoft issued were for North Korea-based state actors during the last three months of 2020. The majority of the North Korean targeting was directed at consumer account targets, based on the likelihood of obtaining non-publicly available diplomatic or geopolitical intelligence. As Microsoft reported in November 2020, &nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/11\/13\/health-care-cyberattacks-covid-19-paris-peace-forum\/\" target=\"_blank\" rel=\"noopener\">ZINC and CERIUM targeted pharmaceutical companies and vaccine researchers<\/a> in several countries, probably to speed up North Korea\u2019s own vaccine research. North Korea also continued to target financial companies with the intent of stealing cryptocurrency and intellectual property.<sup>6<\/sup><\/p>\n<h2>Private sector actors supply the tools<\/h2>\n<p>Though not nation-state actors themselves, private sector offensive actors (PSOAs) create and sell malicious cyber technologies to nation-state buyers. PSOA tools have been observed targeting dissidents, human rights defenders, journalists, and other private citizens. In December 2020, Microsoft\u2019s efforts to protect our customers led us to file an amicus brief in support of WhatsApp\u2019s case against Israel-based NSO Group Technologies.<sup>7<\/sup>&nbsp;The brief asks the court to reject NSO Group\u2019s position that it\u2019s not responsible for the use of its surveillance and espionage products by governments. Microsoft also worked with <a href=\"https:\/\/citizenlab.ca\/\" target=\"_blank\" rel=\"noopener\">Citizen Lab<\/a> to disable malware used by Israel-based PSOA, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/07\/15\/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware\/\" target=\"_blank\" rel=\"noopener\">SOURGUM (aka Candiru)<\/a>, which created malware and zero-day exploits (fixed in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31979\" target=\"_blank\" rel=\"noopener\">CVE-2021-31979<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33771\" target=\"_blank\" rel=\"noopener\">CVE-2021-33771<\/a>) as a part of a hacking-as-a-service package sold to government agencies and other malicious actors.<\/p>\n<h2>Comprehensive protection starts with individuals<\/h2>\n<p>One thing is clear: nation-state actors are well-funded and employ techniques of tremendous breadth and sophistication. More than other adversaries, nation-state attackers will also target individuals specifically for access to their connections, communications, and information. These attackers are constantly refining their tactics and techniques; therefore, defense-in-depth strategies should include <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/attack-simulation-training?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">educating employees<\/a> on how to avoid being targeted themselves. Most importantly, applying <a href=\"https:\/\/www.microsoft.com\/en-us\/insidetrack\/transitioning-to-modern-access-architecture-with-zero-trust\" target=\"_blank\" rel=\"noopener\">Zero Trust principles<\/a> across corporate resources helps secure today\u2019s mobile workforce\u2014protecting people, devices, applications, and data no matter their location or the scale of threats faced.<\/p>\n<h2>Learn more<\/h2>\n<p>For a deep dive into our latest information on nation-state threats, download the <a href=\"https:\/\/aka.ms\/microsoftdigitaldefensereport\" target=\"_blank\" rel=\"noopener\">2021 Microsoft Digital Defense Report<\/a> and watch the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/nation-state-attacks#office-ContentAreaHeadingTemplate-hkzu7ix\" target=\"_blank\" rel=\"noopener\">Decoding NOBELIUM docuseries<\/a>. Also, look for more blog posts providing information for each themed week of Cybersecurity Awareness Month 2021. Read our latest posts:<\/p>\n<p>Be sure to visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/securitynow\" target=\"_blank\" rel=\"noopener\">Cybersecurity Awareness Month page<\/a> for links to additional resources and information on protecting your organization year-round. <strong>Do your part. #BeCyberSmart<\/strong><\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr>\n<p><sup>1<\/sup><a href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/Chinese-Cyber-Activity-Targeting-Managed-Service-Providers.pdf\" target=\"_blank\" rel=\"noopener\">Awareness Briefing: Chinese Cyber Activity Targeting Managed Service Providers<\/a>, Cybersecurity Infrastructure Security Agency.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.npr.org\/2021\/04\/16\/985439655\/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack\" target=\"_blank\" rel=\"noopener\">A \u2018Worst Nightmare\u2019 Cyberattack: The Untold Story Of The SolarWinds Hack<\/a>, Monika Estatieva, NPR. 16 April 2021.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.cybersecuritydive.com\/news\/mimecast-supply-chain-attack-Microsoft-365\/593368\/\" target=\"_blank\" rel=\"noopener\">Mimecast attributes supply chain attack to SolarWinds\u2019 hackers<\/a>, David Jones, Cybersecurity Dive. 14 January 2021.<\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/securityboulevard.com\/2020\/11\/pay2key-ransomware-joins-the-threat-landscape\/\" target=\"_blank\" rel=\"noopener\">Pay2Key Ransomware Joins the Threat Landscape<\/a>, Tomas Meskauskas, Security Boulevard. 30 November 2020.<\/p>\n<p><sup>5<\/sup><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/n3tw0rm-ransomware-emerges-in-wave-of-cyberattacks-in-israel\/\" target=\"_blank\" rel=\"noopener\">N3TW0RM ransomware emerges in wave of cyberattacks in Israel<\/a>, Lawrence Abrams, Bleeping Computer. 2 May 2021.<\/p>\n<p><sup>6<\/sup><a href=\"https:\/\/www.cnbc.com\/2021\/02\/17\/north-korean-hackers-charged-in-massive-cryptocurrency-theft-scheme.html\" target=\"_blank\" rel=\"noopener\">North Korean hackers charged in massive cryptocurrency theft scheme<\/a>, Dan Mangan, CNBC. 17 February 2021.<\/p>\n<p><sup>7<\/sup><a href=\"https:\/\/techcrunch.com\/2020\/12\/21\/google-cisco-and-vmware-join-microsoft-to-oppose-nso-group-in-whatsapp-spyware-case\/\" target=\"_blank\" rel=\"noopener\">Google, Cisco and VMware join Microsoft to oppose NSO Group in WhatsApp spyware case<\/a>, Zack Whittaker, Tech Crunch. 21 December 2020.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/10\/25\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about targets and methods used by today\u2019s nation-state threat actors, and how your organization can create a more secure environment.<br \/>\nThe post Microsoft Digital Defense Report shares new insights on nation-state attacks appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43598,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-43597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Digital Defense Report shares new insights on nation-state attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Digital Defense Report shares new insights on nation-state attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-25T16:00:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2049\" \/>\n\t<meta property=\"og:image:height\" content=\"1388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Digital Defense Report shares new insights on nation-state attacks\",\"datePublished\":\"2021-10-25T16:00:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/\"},\"wordCount\":1605,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/\",\"name\":\"Microsoft Digital Defense Report shares new insights on nation-state attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png\",\"datePublished\":\"2021-10-25T16:00:17+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png\",\"width\":2049,\"height\":1388},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Digital Defense Report shares new insights on nation-state attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Digital Defense Report shares new insights on nation-state attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Digital Defense Report shares new insights on nation-state attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-25T16:00:17+00:00","og_image":[{"width":2049,"height":1388,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Digital Defense Report shares new insights on nation-state attacks","datePublished":"2021-10-25T16:00:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/"},"wordCount":1605,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/","name":"Microsoft Digital Defense Report shares new insights on nation-state attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png","datePublished":"2021-10-25T16:00:17+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks.png","width":2049,"height":1388},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-digital-defense-report-shares-new-insights-on-nation-state-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Microsoft Digital Defense Report shares new insights on nation-state attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43597"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43598"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}