This is the Trace Id: 92f41c4c988918fdb334f9365e3f6d49
Skip to main content
Microsoft
Security Insider
Security Insider
Security Insider
Home
Emerging threats
Intelligence reports
Microsoft Digital Defense Reports
Cyber Signals reports
Nation state reports
More reports
Practical cyber defense
Meet the experts
Browse by topic
AI
Business email compromise
Cybercrime
Cyber influence operations
DDoS
Identity
IoT and OT
Nation state reports
Phishing
Ransomware
Threat actors
Vulnerabilities
More
All Microsoft
Global
Microsoft Security
Azure
Dynamics 365
Microsoft 365
Microsoft Teams
Windows 365
Tech & innovation
Tech & innovation
Microsoft Cloud
AI
Azure Space
Mixed reality
Microsoft HoloLens
Microsoft Viva
Quantum computing
Sustainability
Industries
Industries
Education
Automotive
Financial services
Government
Healthcare
Manufacturing
Retail
All industries
Partners
Partners
Find a partner
Become a partner
Partner Network
Azure Marketplace
AppSource
Resources
Resources
Blog
Microsoft Advertising
Developer Center
Documentation
Events
Licensing
Microsoft Learn
Microsoft Research
View Sitemap
Search
Search Microsoft Security
No results
Cancel
Threat landscape
Strengthen your defenses with actionable insights and industry reports from Microsoft Threat Intelligence experts.
7 minutes
10 essential insights from the Microsoft Digital Defense Report 2024
Understand the most notable trends in cybersecurity, including how threats are evolving, and which defense strategies are most effective.
40 minutes
Get a pulse check on the state of ransomware
13 minutes
Finding bootloader vulnerabilities faster with AI
28 minutes
How threat actors exploit remote monitoring and management
12 minutes
AI-powered deception: Emerging fraud threats and countermeasures
Understand them to defend against them
Get insights on active nation-state threat actors and cybercriminal organizations with analysis and updates from Microsoft Threat Intelligence.
All
Agriculture
Construction
Defense
Education
Emergency services
Financial
Government
Healthcare
Law enforcement
Law firms
Manufacturing
Maritime
Media
Other topics
Non-governmental organizations
Non-profits
Oil and gas
Political dissidents
Private sector
Software and technology
Think tanks
Transportation
Utilities
Nation-state actors
Financially motivated
Private sector offensive actors
Groups in development
Previous
Next
Previous Slide
Next Slide
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Mint Sandstorm
Mint Sandstorm goes after activists, journalists, and think tanks inside and outside Iran.
Learn more
Silk Typhoon
Silk Typhoon focuses on reconnaissance campaigns in the United States, Australia, Japan, and Vietnam.
Learn more
Forest Blizzard
Forest Blizzard is a Russian nation-state actor that uses malware to compromise cloud and on-premises environments.
Learn more
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Crimson Sandstorm
Using phishing and fictitious social media accounts, Crimson Sandstorm delivers malware to exfiltrate data.
Learn more
Gray Sandstorm
Nation-state actor, Gray Sandstorm, used password spray to target accounts in an organization.
Learn more
Periwinkle Tempest
Periwinkle Tempest is responsible for developing, distributing, and managing several ransomware payloads.
Learn more
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Cadet Blizzard
Cadet Blizzard is a Russian-sponsored group that conducts operations against Ukraine and Europe.
Learn more
Smoke Sandstorm
Based in Iran, Smoke Sandstorm compromises email accounts at organizations in the Middle East.
Learn more
Hazel Sandstrom
Linked to Iran, Hazel Sandstorm disrupted government websites and public services in Albania in 2022.
Learn more
Nylon Typhoon
Nylon Typhoon creates and deploys custom malware that allows them to compromise remote access.
Learn more
Pistachio Tempest
Pistachio Tempest uses ransomware-as-a-service offerings to gain access, exfiltrate data, and extort victims.
Learn more
Manatee Tempest
Manatee Tempest is part of the ransomware-as-a-service economy and provides custom Cobalt Strike loaders.
Learn more
Storm-0530
A group of actors originating from North Korea, Storm-0530 targets small businesses with ransomware.
Learn more
Diamond Sleet
Based in North Korea, Diamond Sleet uses custom malware for espionage, data theft, and network destruction.
Learn more
Wine Tempest
Wine Tempest typically infiltrates a machine in a network and deploys human-operated ransomware.
Learn more
Back to carousel navigation controls
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Back to carousel navigation controls
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Mint Sandstorm
Mint Sandstorm goes after activists, journalists, and think tanks inside and outside Iran.
Learn more
Silk Typhoon
Silk Typhoon focuses on reconnaissance campaigns in the United States, Australia, Japan, and Vietnam.
Learn more
Forest Blizzard
Forest Blizzard is a Russian nation-state actor that uses malware to compromise cloud and on-premises environments.
Learn more
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Crimson Sandstorm
Using phishing and fictitious social media accounts, Crimson Sandstorm delivers malware to exfiltrate data.
Learn more
Gray Sandstorm
Nation-state actor, Gray Sandstorm, used password spray to target accounts in an organization.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Forest Blizzard
Forest Blizzard is a Russian nation-state actor that uses malware to compromise cloud and on-premises environments.
Learn more
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Periwinkle Tempest
Periwinkle Tempest is responsible for developing, distributing, and managing several ransomware payloads.
Learn more
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Back to carousel navigation controls
Cadet Blizzard
Cadet Blizzard is a Russian-sponsored group that conducts operations against Ukraine and Europe.
Learn more
Back to carousel navigation controls
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Mint Sandstorm
Mint Sandstorm goes after activists, journalists, and think tanks inside and outside Iran.
Learn more
Smoke Sandstorm
Based in Iran, Smoke Sandstorm compromises email accounts at organizations in the Middle East.
Learn more
Forest Blizzard
Forest Blizzard is a Russian nation-state actor that uses malware to compromise cloud and on-premises environments.
Learn more
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Hazel Sandstrom
Linked to Iran, Hazel Sandstorm disrupted government websites and public services in Albania in 2022.
Learn more
Cadet Blizzard
Cadet Blizzard is a Russian sponsored group that conducts operations against Ukraine and Europe.
Learn more
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Nylon Typhoon
Nylon Typhoon creates and deploys custom malware that allows them to compromise remote access.
Learn more
Crimson Sandstorm
Using phishing and fictitious social media accounts, Crimson Sandstorm delivers malware to exfiltrate data.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Pistachio Tempest
Pistachio Tempest uses ransomware-as-a-service offerings to gain access, exfiltrate data, and extort victims.
Learn more
Periwinkle Tempest
Periwinkle Tempest is responsible for developing, distributing, and managing several ransomware payloads.
Learn more
Back to carousel navigation controls
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Back to carousel navigation controls
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Back to carousel navigation controls
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Back to carousel navigation controls
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Manatee Tempest
Manatee Tempest is part of the ransomware-as-a-service economy and provides custom Cobalt Strike loaders.
Learn more
Smoke Sandstorm
Based in Iran, Smoke Sandstorm compromises email accounts at organizations in the Middle East.
Learn more
Storm-0530
A group of actors originating from North Korea, Storm-0530 targets small businesses with ransomware.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Mint Sandstorm
Mint Sandstorm goes after activists, journalists, and think tanks inside and outside Iran.
Learn more
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Nylon Typhoon
Nylon Typhoon creates and deploys custom malware that allows them to compromise remote access.
Learn more
Back to carousel navigation controls
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Back to carousel navigation controls
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Back to carousel navigation controls
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Diamond Sleet
Based in North Korea, Diamond Sleet uses custom malware for espionage, data theft, and network destruction.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Forest Blizzard
Forest Blizzard is a Russian nation-state actor that uses malware to compromise cloud and on-premises environments.
Learn more
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Cadet Blizzard
Cadet Blizzard is a Russian sponsored group that conducts operations against Ukraine and Europe.
Learn more
Crimson Sandstorm
Using phishing and fictitious social media accounts, Crimson Sandstorm delivers malware to exfiltrate data.
Learn more
Diamond Sleet
Based in North Korea, Diamond Sleet uses custom malware for espionage, data theft, and network destruction.
Learn more
Gray Sandstorm
Nation-state actor, Gray Sandstorm, used password spray to target accounts in an organization.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Forest Blizzard
Forest Blizzard is a Russian nation-state actor that uses malware to compromise cloud and on-premises environments.
Learn more
Diamond Sleet
Based in North Korea, Diamond Sleet uses custom malware for espionage, data theft, and network destruction.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Gray Sandstorm
Nation-state actor, Gray Sandstorm, used password spray to target accounts in an organization.
Learn more
Back to carousel navigation controls
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Smoke Sandstorm
Based in Iran, Smoke Sandstorm compromises email accounts at organizations in the Middle East.
Learn more
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Forest Blizzard
Forest Blizzard is a Russian nation-state actor that uses malware to compromise cloud and on-premises environments.
Learn more
Volt Typhoon
Based out of China, Volt Typhoon targets critical infrastructure in the United States.
Learn more
Plaid Rain
Plaid Rain primarily targets critical manufacturing, IT, and defense organizations in Israel.
Learn more
Hazel Sandstrom
Linked to Iran, Hazel Sandstorm disrupted government websites and public services in Albania in 2022.
Learn more
Cadet Blizzard
Cadet Blizzard is a Russian sponsored group that conducts operations against Ukraine and Europe.
Learn more
Aqua Blizzard
Located in Russia, Aqua Blizzard targets governmental and non-governmental organizations in Ukraine.
Learn more
Nylon Typhoon
Nylon Typhoon creates and deploys custom malware that allows them to compromise remote access.
Learn more
Crimson Sandstorm
Using phishing and fictitious social media accounts, Crimson Sandstorm delivers malware to exfiltrate data.
Learn more
Diamond Sleet
Based in North Korea, Diamond Sleet uses custom malware for espionage, data theft, and network destruction.
Learn more
Gray Sandstorm
Nation-state actor, Gray Sandstorm, used password spray to target accounts in an organization.
Learn more
Back to carousel navigation controls
Previous Slide
Next Slide
Manatee Tempest
Manatee Tempest is part of the ransomware-as-a-service economy and provides custom Cobalt Strike loaders.
Learn more
Wine Tempest
Wine Tempest typically infiltrates a machine in a network and deploys human-operated ransomware.
Learn more
Smoke Sandstorm
Based in Iran, Smoke Sandstorm compromises email accounts at organizations in the Middle East.
Learn more
Pistachio Tempest
Pistachio Tempest uses ransomware-as-a-service offerings to gain access, exfiltrate data, and extort victims.
Learn more
Periwinkle Tempest
Periwinkle Tempest is responsible for developing, distributing, and managing several ransomware payloads.
Learn more
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Back to carousel navigation controls
Caramel Tsunami
Caramel Tsunami sells hacking-as-a-service packages that include malware or zero-day exploits.
Learn more
Back to carousel navigation controls
Silk Typhoon
Silk Typhoon focuses on reconnaissance in the United States, Australia, Japan, and Vietnam.
Learn more
Back to carousel navigation controls
Back to tabs
Threat actors
13 minutes
How Silk Typhoon compromises supply chains
23 minutes
The tactics, techniques, and procedures of a Seashell Blizzard subgroup
32 minutes
Understand and mitigate a large-scale malvertising campaign
13 minutes
Threat actors use tax-themed phishing during tax season
2 minutes
How threat actors are using AI now—and what’s next
Reports
6 minutes
Tackling healthcare-targeted ransomware. Together.
10 minutes
Manipulating trust: Why social engineering fraud works
Over an hour
Microsoft Digital Defense Report 2024
20 minutes
Microsoft Digital Defense Report 2023: CISO Executive Summary
Over an hour
Microsoft Digital Defense Report 2023
Connect with us
Get the CISO Digest
Stay ahead with expert insights, industry trends, and security research in this bimonthly email series.
Sign up
Why Microsoft Security
Discover why Microsoft Security is the top choice for comprehensive security in the era of AI.
Learn more
Follow Microsoft Security
Follow Microsoft Security