Russia accounted for a majority (58%) of state-sponsored cybercrime attacks detected by Microsoft’s cybersecurity experts over the past year, mostly targeting government agencies and think tanks in the US, the company has claimed.
The insights come from Microsoft’s annual Digital Defense Report and reveal that the successful SolarWinds campaign helped boost the success-rate of Russian state-backed actors from 21% last year to 32% this year.
According to Microsoft, after the US, the favorite targets of the Russian threat actors were Ukraine, Britain and other European NATO members.
- These are the best endpoint protection tools
- Here’s our choice of the best malware removal software on the market
- Also take a look at the best firewall apps and services
At the receiving end of these campaigns were government agencies, targeted for gathering information, which made up 53% of the targets, up from a mere 3% last year.
Tracking state-sponsored activity
The report points out that while Russia leads the field, North Korea, Iran, and China, aren’t far behind in terms of the volume of attacks.
Interestingly, all the state-sponsored actors were found to have been evolving their approaches as well, especially since espionage is no longer the only purpose for nation-state attacks.
“The trends are clear: nation-states are increasingly using, and will continue to use, cyberattacks for whatever their political objectives are, whether those are espionage, disruption or destruction,” says Microsoft.
The company expects more countries to join the list of those engaging in offensive cyber campaigns, and that their attacks will become “more brazen, persistent and damaging” unless there are more serious consequences.
Besides tracking the activity and growth of nation-sponsored actors, the Microsoft report, which covers the period from July 2020 to June 2021, also covers trends across cybercrime, supply chain security, hybrid work, and disinformation.