{"id":44230,"date":"2021-12-02T17:00:28","date_gmt":"2021-12-02T17:00:28","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=102225"},"modified":"2021-12-02T17:00:28","modified_gmt":"2021-12-02T17:00:28","slug":"behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/","title":{"rendered":"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/M365CO19_ENT_lenovoThinkPad_6718-1.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><em>This is the third in a four-part <\/em><em>blog series on the NOBELIUM nation-state cyberattack. In December 2020, Microsoft began sharing details with the world about what became known as the most sophisticated nation-state cyberattack in history.&nbsp;<\/em><em>Microsoft\u2019s&nbsp;<\/em><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/nation-state-attacks#office-ContentAreaHeadingTemplate-hkzu7ix\" target=\"_blank\" rel=\"noopener\"><em>four-part video series<\/em><\/a><em>&nbsp;\u201cDecoding NOBELIUM\u201d pull<\/em><em>s the curtain back on the NOBELIUM incident and how world-class threat hunters from Microsoft and around the industry came together to take on the most sophisticated nation-state attack in history. In this third post, we\u2019ll explore Microsoft\u2019s response to the NOBELIUM attack covered in the <a href=\"https:\/\/youtu.be\/fS97PC4FLCc\" target=\"_blank\" rel=\"noopener\">third episode<\/a> of the docuseries.<\/em><\/p>\n<p>Defending against a major cyberattack requires the same level of readiness that you need for any major crisis, according to Microsoft 365 Security Chief of Staff Elizabeth Stephens, a 19-year Marine Corps veteran who served in three combat deployments. There\u2019s a mission. There\u2019s a plan of action. And there\u2019s an expert team ready to go. Stephens was part of a dedicated response team that was mobilized in response to the NOBELIUM nation-state attack in December 2020.<\/p>\n<p>\u201cAll of the teams came together in a way that very much reminded me of the way my Marine Corps came together,\u201d said Stephens. \u201cThe way we respond is very much like first responders. We pride ourselves on being able to come together regardless of our areas of specialty and expertise and fill in the gaps between each other very quickly to get a mission completed. [It\u2019s about] selflessness and the sense of, if we weren\u2019t defending then who else was going to?\u201d<\/p>\n<p>As explained in our first post in the series, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/28\/how-nation-state-attackers-like-nobelium-are-changing-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">How nation-state attackers like NOBELIUM are changing cybersecurity<\/a>, these sophisticated actors are working to further a given country\u2019s interests through cyberespionage or intelligence-gathering efforts. The multi-pronged attack, which included supply chain compromise from NOBELIUM, a Russian-linked group of hackers, is widely recognized as the most sophisticated nation-state cyberattack in history. When an attack of this magnitude is discovered, the response is equally significant. In the second post in the series, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/10\/the-hunt-for-nobelium-the-most-sophisticated-nation-state-attack-in-history\/\" target=\"_blank\" rel=\"noopener\">The hunt for NOBELIUM, the most sophisticated nation-state attack in history<\/a>, we covered the initial industry-wide investigation and gathering of data to understand the attack.<\/p>\n<p>In the <a href=\"https:\/\/youtu.be\/fS97PC4FLCc\" target=\"_blank\" rel=\"noopener\">third episode<\/a> of our \u201cDecoding NOBELIUM\u201d series, we reveal new details about how Microsoft worked to disrupt the adversary and safeguard the organizations: notifying and supporting impacted customers, deploying novel prevention rapidly, and providing detection measures to protect all of its customers against the threat.<\/p>\n<h2>Notifying customers of the NOBELIUM attack<\/h2>\n<p>Customers needed to be notified quickly so they could investigate and understand the scope of the attack inside their environments. Once the threat hunters began isolating threat markers for NOBELIUM activity, they could effectively identify and contact impacted customers. The security community, traditionally, tells customers that they will never receive a phone call from defenders\u2014and to view any calls suspiciously. In this case, with attackers having access to victim environments, there was no safe alternative. Making a call with the difficult news of a sophisticated incursion would be hard enough, but in some instances, they had to find creative ways to validate that it was, in fact, Microsoft on the phone. As part of the notification, the team shared information and guidance about the attack to enable the customer to further investigate the scope and act to begin remediation. The news of NOBELIUM\u2019s activity understandably stunned customers.<\/p>\n<p>\u201cTo see the look on people\u2019s faces as the gravity of that [situation] settled in, was certainly sobering for me and my team, but it was also a tremendous incentive to keep going until we could get to the very bottom of it,\u201d said Franklin, Microsoft Identity Security Response Team Lead.<\/p>\n<h2>Building product detections to support customers<\/h2>\n<p>Those customer contacts were just part of Microsoft\u2019s response to this attack. Microsoft\u2019s threat hunters continued to pore over massive amounts of aggregated telemetry\u2014including user, email, collaboration tools, endpoint, cloud activity, and cloud application security\u2014to identify more subtle attack markers. Called tactics, techniques, and procedures (TTP), these markers were used to track NOBELIUM\u2019s movements.<\/p>\n<p>\u201cBy taking a holistic view, we are able to track attackers that move from domain to domain and that is usually where they get lost in the noise, in the transitions,\u201d said Michael Shalev, Principal Program Manager for Microsoft 365 Defender.<\/p>\n<p>The team identified more than 70 TTPs associated with the NOBELIUM attack that we shared publicly. Together, they painted a picture of how the NOBELIUM group operated. Microsoft teams determined which TTPs were specific to an organization, and which were found across the impacted organizations. They quickly used these TTPs to build automated detections into security products so impacted organizations could \u201creturn their network and assets to a healthy state\u201d and unimpacted organizations could protect themselves from similar threats, Shalev explained.<\/p>\n<p>Releasing detections into security products in response to a specific attack isn\u2019t new; Microsoft regularly releases detections into security products in response to attacks. But the release volume after the NOBELIUM incident was unprecedented. During a three-week period, Microsoft researchers released multiple detections a day\u2014in the form of targeted custom queries shared through blog posts or updates released directly into the products to enable real-time action. \u201cSeconds count when responding to an attack like this,\u201d said Partner Product Manager Sarah Fender of <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener\">Microsoft Sentinel<\/a>, Microsoft\u2019s cloud-native security information and event management platform.<\/p>\n<p>For example, the threat hunters discovered specific techniques that NOBELIUM used to evade security software and analyst tools. As there can be benign reasons to turn off sensors or logging, the TTP research was critical to detecting when the activity was malicious. In response, the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/endpoint-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Endpoint<\/a> team developed new anti-tampering policies, hunting queries, and detections to identify and send alerts on these specific NOBELIUM-related activities.<\/p>\n<p>\u201cYou really have to meet the customer where they are because the attack is so significant that they\u2019re all going to need help in different sorts of ways,\u201d said Cristin Goodwin, Associate General Counsel for the Microsoft Digital Security Unit.<\/p>\n<h2>Cybersecurity strategies and available resources<\/h2>\n<p>In the third episode of our \u201cDecoding NOBELIUM\u201d series, security professionals share insights on defending customers after NOBELIUM\u2019s discovery. <a href=\"https:\/\/youtu.be\/fS97PC4FLCc\" target=\"_blank\" rel=\"noopener\">Watch the episode<\/a> for guidance on effective cybersecurity hygiene. Look out for the final post in the NOBELIUM nation-state attack series, where we will offer a fuller breakdown of the NOBELIUM attack and share predictions and tips for the future of cybersecurity. Read our previous posts in this series:<\/p>\n<p>Microsoft is committed to helping organizations stay protected from cyberattacks whether cybercriminal or nation-state. Consistent with our mission to provide security for all, Microsoft will use our leading threat intelligence and a global team of dedicated cybersecurity defenders to help protect our customers and the world. Just two recent examples of Microsoft\u2019s efforts to combat nation-state attacks include a September 2021 discovery, an investigation of a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/27\/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor\/\" target=\"_blank\" rel=\"noopener\">NOBELIUM malware referred to as FoggyWeb<\/a>, and our May 2021 profiling of NOBELIUM\u2019s early-stage toolset compromising <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/28\/breaking-down-nobeliums-latest-early-stage-toolset\/\" target=\"_blank\" rel=\"noopener\">EnvyScout, BoomBox, NativeZone, and VaporRage<\/a>.<\/p>\n<p>For immediate support, visit the <u><a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\" target=\"_blank\" rel=\"noopener\">Microsoft Security Response Center<\/a><\/u> where you can report an issue and get guidance from the latest security reports and Microsoft Security Response Center blogs.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/02\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the third of a four-part series on the Nobelium nation-state attack, we share how Microsoft product teams built new detections into products to better protect customers.<br \/>\nThe post Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44231,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,5345,9070,6578],"class_list":["post-44230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-incident-response","tag-microsoft-defender-for-office-365","tag-threat-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-02T17:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/M365CO19_ENT_lenovoThinkPad_6718-1.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack\",\"datePublished\":\"2021-12-02T17:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/\"},\"wordCount\":1258,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg\",\"keywords\":[\"Cybersecurity\",\"incident response\",\"Microsoft Defender for Office 365\",\"Threat protection\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/\",\"name\":\"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg\",\"datePublished\":\"2021-12-02T17:00:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/","og_locale":"en_US","og_type":"article","og_title":"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-02T17:00:28+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/M365CO19_ENT_lenovoThinkPad_6718-1.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack","datePublished":"2021-12-02T17:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/"},"wordCount":1258,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg","keywords":["Cybersecurity","incident response","Microsoft Defender for Office 365","Threat protection"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/","url":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/","name":"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg","datePublished":"2021-12-02T17:00:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44230"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44231"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}