This is the Trace Id: 798454e66f28e88a4926f73c03c6b4d1
Skip to main content Why Microsoft Security AI-powered cybersecurity Cloud security Data security & governance Identity & access Privacy & risk management Security for AI Unified SecOps Zero Trust Microsoft Defender Microsoft Entra Microsoft Intune Microsoft Priva Microsoft Purview Microsoft Sentinel Microsoft Security Copilot Microsoft Entra ID (Azure Active Directory) Microsoft Entra Agent ID Microsoft Entra External ID Microsoft Entra Identity Governance Microsoft Entra ID Protection Microsoft Entra Internet Access Microsoft Entra Private Access Microsoft Entra Permissions Management Microsoft Entra Verified ID Microsoft Entra Workload ID Microsoft Entra Domain Services Azure Key Vault Microsoft Sentinel Microsoft Defender for Cloud Microsoft 365 Defender Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Microsoft Security Exposure Management Microsoft Defender Vulnerability Management Microsoft Defender Threat Intelligence Microsoft Defender Suite for Business Premium Microsoft Defender for Cloud Microsoft Defender Cloud Security Posture Mgmt Microsoft Defender External Attack Surface Management GitHub Advanced Security Microsoft Defender for Endpoint Microsoft 365 Defender Microsoft Defender for Business Microsoft Intune core capabilities Microsoft Defender for IoT Microsoft Defender Vulnerability Management Microsoft Intune Advanced Analytics Microsoft Intune Endpoint Privilege Management Microsoft Intune Enterprise Application Management Microsoft Intune Remote Help Microsoft Cloud PKI Microsoft Purview Communication Compliance Microsoft Purview Compliance Manager Microsoft Purview Data Lifecycle Management Microsoft Purview eDiscovery Microsoft Purview Audit Microsoft Priva Risk Management Microsoft Priva Subject Rights Requests Microsoft Purview Data Governance Microsoft Purview Suite for Business Premium Microsoft Purview data security capabilities Pricing Services Partners Cybersecurity awareness Customer stories Security 101 Product trials Industry recognition Microsoft Security Insider Microsoft Digital Defense Report Security Response Center Microsoft Security Blog Microsoft Security Events Microsoft Tech Community Documentation Technical Content Library Training & certifications Compliance Program for Microsoft Cloud Microsoft Trust Center Service Trust Portal Microsoft Secure Future Initiative Business Solutions Hub Contact Sales Start free trial Microsoft Security Azure Dynamics 365 Microsoft 365 Microsoft Teams Windows 365 Microsoft AI Azure Space Mixed reality Microsoft HoloLens Microsoft Viva Quantum computing Sustainability Education Automotive Financial services Government Healthcare Manufacturing Retail Find a partner Become a partner Partner Network Microsoft Marketplace AppSource AppSource Blog Microsoft Advertising Developer Center Documentation Events Licensing Microsoft Learn Microsoft Research View Sitemap

Nation State Threats

Develop your response to evolving nation state threats.

Cyber actors have become more brazen and aggressive as geopolitical relationships have broken down

Political developments have shaped the priorities of state sponsored threat groups. Supply chain attacks have increased with a focus on Information Technology companies so as to gain access to downstream customers.

A diagram showing industry sectors targeted by nation state actors

Nation state groups targeted a range of sectors. Russian and Iranian state actors targeted the IT industry as a means to access the IT firms’ customers. Think tanks, nongovernmental organizations (NGOs), universities, and government agencies remained other common targets of nation state actors.

Russia threatening Ukraine and beyond

Russian state actors launched cyber operations during its invasion of Ukraine. Organizations must take measures to harden cybersecurity against threats stemming from these actors.

China expanding global targeting

Widespread Chinese threat activity targeted countries globally, especially smaller nations in Southeast Asia, to gain competitive advantage on all fronts.

Iran growing increasingly aggressive

Iranian actors increased cyberattacks against Israel, expanded ransomware attacks beyond regional adversaries to US and EU victims, and targeted high profile US critical infrastructure.

North Korea pursuing the regime’s goals

North Korea targeted defense and aerospace companies, cryptocurrency, news outlets, defectors, and aid organizations, to build defense, bolster the economy, and ensure domestic stability.

IT supply chain as a gateway to the digital ecosystem

IT services providers are being targeted to attack third-party targets and gain access to downstream clients in government, policy, and critical infrastructure sectors.

A diagram showing two approaches to compromise

This diagram depicts NOBELIUM’s multi-vectored approach to compromising its ultimate targets and the collateral damage to other victims along the way. In addition to the actions shown above, NOBELIUM launched password spray and phishing attacks against the entities involved, even targeting the personal account of at least one government employee as another potential route to compromise.

Rapid vulnerability exploitation

Identification and exploitation of previously unknown vulnerabilities has become a key tactic, with exploits happening increasingly more quickly and at a massive scale.

A diagram outlining speed and scale of vulnerability commoditization

On average, it takes only 14 days for an exploit to be available in the wild after a vulnerability is publicly disclosed. This view provides an analysis of the timelines of exploitation of zero-day vulnerabilities, along with the number of systems vulnerable to the given exploit and active on the internet from the time of first public disclosure.

Cyber mercenaries threaten the stability of cyberspace

A growing industry of private companies is developing and selling advanced tools, techniques, and services to enable their clients (often governments) to break into networks and devices.

Operationalizing cybersecurity for peace and security

We urgently need a consistent, global framework that prioritizes human rights and protects people from reckless state behavior online, to bring stability to cyberspace.

Explore other critical focus areas

The State of Cybercrime

Cybercrime continues to rise, driven by increases in both random and targeted attacks. Attack methods have evolved to create increasingly diverse threats.

Devices and Infrastructure

As organizations harness advances in computing capability and entities digitize to thrive, the attack surface of the digital world is exponentially increasing.

Cyber Influence Operations

Today’s foreign influence operations utilize new methods and technologies, making their campaignsdesigned to erode trust more efficient and effective.

Cyber Resilience

As threats in the cyber landscape increase, building cyber resilience into the fabric of the organization is as crucial as financial and operational resilience.

Read the report and connect with us

Follow Microsoft