{"id":3029,"date":"2026-01-20T13:49:34","date_gmt":"2026-01-20T21:49:34","guid":{"rendered":"https:\/\/celacampaig.wpenginepowered.com\/?page_id=3029"},"modified":"2026-04-16T07:08:47","modified_gmt":"2026-04-16T14:08:47","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div data-bi-ct=\"group\" class=\"wp-block-group alignfull microsoft-breakpoint-id-aj19niumf has-global-padding is-layout-constrained wp-container-core-group-is-layout-19e250f3 wp-block-group-is-layout-constrained\" data-microsoft-breakpoint-id=\"aj19niumf\"><div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-clear-blue-fade-gradient-background has-text-color has-background has-link-color microsoft-breakpoint-id-wmdfkgjku wp-elements-610e00342d7493a2ebd0c269fd299499 has-global-padding is-layout-constrained wp-container-core-group-is-layout-3049fbf5 wp-block-group-is-layout-constrained block-visibility-hide-small-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" data-microsoft-breakpoint-id=\"wmdfkgjku\"><div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-87535699 wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\"><div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-929da708 wp-block-column-is-layout-flow\" style=\"padding-right:0;flex-basis:84%\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-moeusyoov is-vertical is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-7e996498 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\" data-microsoft-breakpoint-id=\"moeusyoov\"><h2 style=\"font-size:clamp(35.2px, 2.2rem + ((1vw - 3.9px) * 2.717), 64px);\" class=\"has-link-color wp-elements-7777dc56570e62002487a91527650960 wp-block-post-title has-text-color has-brown-black-color wp-container-content-9cfa9a5a\">Cybersecurity<\/h2>\n\n\n<div style=\"--social-share-foreground-color: #dcede8;--social-share-background-color: #291817;--social-share-icon-size: clamp(2rem, 4vw + 1rem, 2.125rem);\" class=\"social-share social-share--size-medium wp-block-microsoft-social-share-social-share\" data-wp-interactive=\"microsoft-social-share\">\n\n\t\n\t<ul class=\"social-share__list\">\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fcorporate-responsibility%2Ftopics%2Fcybersecurity%2F\" aria-label=\"Share on LinkedIn\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"social-share__link social-share--linkedin\" data-bi-socchn=\"Linkedin\" data-bi-cn=\"Share Linkedin\" data-bi-ecn=\"Share Linkedin\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 25\"><path fill=\"var(--social-share-background-color)\" d=\"M10.998.412c-8.922.654-13.956 10.862-9.123 18.441 4.752 7.45 15.734 7.369 20.336-.18C27.345 10.256 20.754-.294 10.998.422zM8.918 16.68h-2.24V9.311h2.24zm.08-9.22c-.753 1.902-3.617.14-2.16-1.43.935-1.007 2.713.04 2.16 1.43m8.46 9.22h-2.24v-4.53s-.18-.493-.221-.553c-.402-.685-1.608-.614-2.05.03-.15.211-.321.775-.321 1.017v4.036h-2.24V9.311h2.17v.986c.763-1.017 1.778-1.288 3.014-1.087 1.004.161 1.889 1.248 1.889 2.255v5.234-.02Z\"><\/path><\/svg><\/span>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fcorporate-responsibility%2Ftopics%2Fcybersecurity%2F&amp;text=Cybersecurity\" aria-label=\"Share on X\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"social-share__link social-share--x\" data-bi-socchn=\"X\" data-bi-cn=\"Share X\" data-bi-ecn=\"Share X\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\"><circle cx=\"12.366\" cy=\"11.635\" r=\"11.635\" fill=\"var(--social-share-background-color)\"><\/circle><path fill=\"var(--social-share-foreground-color)\" d=\"m13.474 10.745 4.331-4.927H16.78l-3.763 4.277-3.003-4.278H6.548l4.543 6.47-4.543 5.165h1.026l3.972-4.518 3.172 4.519h3.465l-4.71-6.708Zm-5.53-4.17h1.577l2.956 4.136.46.645 3.842 5.376h-1.577z\"><\/path><\/svg><\/span>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"social-share__copy-wrapper\" data-wp-context='\n\t\t\t\t\t\t{\"copyUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/corporate-responsibility\\\/topics\\\/cybersecurity\\\/\",\"showTooltip\":false}\t\t\t\t\t\t'>\n\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/\" aria-label=\"Copy share link\" class=\"social-share__link social-share--share-link copy-link\" data-wp-on--click=\"actions.copyToClipboard\" id=\"share-link-69e5c7f78170b\" data-bi-socchn=\"Share\" data-bi-cn=\"Share Share\" data-bi-ecn=\"Share Share\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" fill=\"none\"><path stroke=\"var(--social-share-background-color)\" stroke-width=\"2\" d=\"m18.274 24.009-4.003 4.002c-3.032 3.033-7.963 3.033-10.996 0s-3.033-7.964 0-10.997l4.002-4.002m3.981 6.995 9.016-8.995m-7.258-3.735 4.002-4.002c3.033-3.033 7.964-3.033 10.997 0s3.033 7.964 0 10.996l-4.003 4.003\"><\/path><\/svg><\/span>\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<span class=\"social-share__copy-notice\" data-wp-class--is-visible=\"state.isTooltipVisible\">\n\t\t\t\t\t\t\tLink copied to clipboard!\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-fc56b577 wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-right:0;padding-bottom:var(--wp--preset--spacing--2-xl-fluid);padding-left:0;flex-basis:60%\"><p class=\"has-brown-black-color has-text-color has-link-color wp-elements-c47de2e971d0c8a77f1b0de6f87500c4 wp-container-content-9cfa9a5a wp-block-paragraph\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.9px) * 0.779), 24px);\">Explore Microsoft&rsquo;s approach to security through law, threat analysis, policy and diplomacy.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-clear-blue-fade-gradient-background has-text-color has-background has-link-color microsoft-breakpoint-id-wmdfkgjku wp-elements-fa356ca1b1cd1635a526f4f535806f1a is-layout-flow wp-block-group-is-layout-flow block-visibility-hide-large-screen block-visibility-hide-medium-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-right:var(--wp--preset--spacing--3-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid);padding-left:var(--wp--preset--spacing--3-xl-fluid)\" data-microsoft-breakpoint-id=\"wmdfkgjku\"><h2 style=\"font-size:clamp(35.2px, 2.2rem + ((1vw - 3.9px) * 2.717), 64px);\" class=\"has-link-color wp-elements-7777dc56570e62002487a91527650960 wp-block-post-title has-text-color has-brown-black-color wp-container-content-9cfa9a5a\">Cybersecurity<\/h2>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-c47de2e971d0c8a77f1b0de6f87500c4 wp-container-content-9cfa9a5a wp-block-paragraph\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.9px) * 0.779), 24px);\">Explore Microsoft&rsquo;s approach to security through law, threat analysis, policy and diplomacy.<\/p>\n\n\n<div style=\"--social-share-foreground-color: #dcede8;--social-share-background-color: #291817;--social-share-icon-size: clamp(2rem, 4vw + 1rem, 2.125rem);\" class=\"social-share social-share--size-medium wp-block-microsoft-social-share-social-share\" data-wp-interactive=\"microsoft-social-share\">\n\n\t\n\t<ul class=\"social-share__list\">\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fcorporate-responsibility%2Ftopics%2Fcybersecurity%2F\" aria-label=\"Share on LinkedIn\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"social-share__link social-share--linkedin\" data-bi-socchn=\"Linkedin\" data-bi-cn=\"Share Linkedin\" data-bi-ecn=\"Share Linkedin\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 25\"><path fill=\"var(--social-share-background-color)\" d=\"M10.998.412c-8.922.654-13.956 10.862-9.123 18.441 4.752 7.45 15.734 7.369 20.336-.18C27.345 10.256 20.754-.294 10.998.422zM8.918 16.68h-2.24V9.311h2.24zm.08-9.22c-.753 1.902-3.617.14-2.16-1.43.935-1.007 2.713.04 2.16 1.43m8.46 9.22h-2.24v-4.53s-.18-.493-.221-.553c-.402-.685-1.608-.614-2.05.03-.15.211-.321.775-.321 1.017v4.036h-2.24V9.311h2.17v.986c.763-1.017 1.778-1.288 3.014-1.087 1.004.161 1.889 1.248 1.889 2.255v5.234-.02Z\"><\/path><\/svg><\/span>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fcorporate-responsibility%2Ftopics%2Fcybersecurity%2F&amp;text=Cybersecurity\" aria-label=\"Share on X\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"social-share__link social-share--x\" data-bi-socchn=\"X\" data-bi-cn=\"Share X\" data-bi-ecn=\"Share X\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\"><circle cx=\"12.366\" cy=\"11.635\" r=\"11.635\" fill=\"var(--social-share-background-color)\"><\/circle><path fill=\"var(--social-share-foreground-color)\" d=\"m13.474 10.745 4.331-4.927H16.78l-3.763 4.277-3.003-4.278H6.548l4.543 6.47-4.543 5.165h1.026l3.972-4.518 3.172 4.519h3.465l-4.71-6.708Zm-5.53-4.17h1.577l2.956 4.136.46.645 3.842 5.376h-1.577z\"><\/path><\/svg><\/span>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<div class=\"social-share__copy-wrapper\" data-wp-context='\n\t\t\t\t\t\t{\"copyUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/corporate-responsibility\\\/topics\\\/cybersecurity\\\/\",\"showTooltip\":false}\t\t\t\t\t\t'>\n\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/\" aria-label=\"Copy share link\" class=\"social-share__link social-share--share-link copy-link\" data-wp-on--click=\"actions.copyToClipboard\" id=\"share-link-69e5c7f782b66\" data-bi-socchn=\"Share\" data-bi-cn=\"Share Share\" data-bi-ecn=\"Share Share\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" fill=\"none\"><path stroke=\"var(--social-share-background-color)\" stroke-width=\"2\" d=\"m18.274 24.009-4.003 4.002c-3.032 3.033-7.963 3.033-10.996 0s-3.033-7.964 0-10.997l4.002-4.002m3.981 6.995 9.016-8.995m-7.258-3.735 4.002-4.002c3.033-3.033 7.964-3.033 10.997 0s3.033 7.964 0 10.996l-4.003 4.003\"><\/path><\/svg><\/span>\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<span class=\"social-share__copy-notice\" data-wp-class--is-visible=\"state.isTooltipVisible\">\n\t\t\t\t\t\t\tLink copied to clipboard!\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t<\/ul>\n<\/div>\n<\/div>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignfull temp-row-hover-underline microsoft-breakpoint-id-bhe17j39i is-layout-flow wp-block-group-is-layout-flow\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"bhe17j39i\"><div class=\"wp-block-cover alignfull\" style=\"min-height:500px;--fade-start:69%;--fade-end:100%;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\" style=\"background-color:#3c6081\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"767\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg\" class=\"wp-block-cover__image-background wp-post-image\" alt=\"\" data-object-fit=\"cover\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg 2560w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1-300x90.jpeg 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1-1024x307.jpeg 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1-768x230.jpeg 768w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1-1536x460.jpeg 1536w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1-2048x614.jpeg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\"><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-af2df36c wp-block-cover-is-layout-constrained\"><div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-15170a87 wp-block-columns-is-layout-flex\" style=\"margin-bottom:0;padding-right:0\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\"><div style=\"height:300px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:42%\"><h2 class=\"wp-block-heading has-clear-blue-color has-text-color has-link-color wp-elements-41aeb3dc22b2bc8cafdad38bfbb4feb2\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-bi-cn=\"Microsoft Digital Defense Report 2025\">Microsoft Digital Defense Report 2025<\/a><\/h2>\n\n\n<p class=\"has-clear-blue-color has-text-color has-link-color wp-elements-fbb36d947fd8a1d72cc820a7299f9ecb wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--lg);margin-bottom:var(--wp--preset--spacing--lg);font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.566), 20px);\">Discover the scale of cyber threats and the strategies&#8232;to defend against them<\/p>\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-left is-nowrap is-layout-flex wp-container-core-buttons-is-layout-dc235284 wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--lg)\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link has-clear-blue-color has-text-color has-link-color has-segoe-sans-font-family has-custom-font-size wp-element-button has-inline-icon\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.566), 20px);font-style:normal;font-weight:600\" data-bi-cn=\"Explore our annual report Read &ldquo;5 things threat analysts wish you knew&rdquo;\">Explore our annual report<span class=\"screen-reader-text\"><br>      Read &ldquo;5 things threat analysts wish you knew&rdquo;<br>    <\/span> <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/section>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-clear-blue-fade-inverted-gradient-background has-background microsoft-breakpoint-id-rkbp5uvrq is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-bottom:var(--wp--preset--spacing--2-xl-fluid);padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:0\" data-microsoft-breakpoint-id=\"rkbp5uvrq\"><div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-clear-blue-fade-inverted-gradient-background has-background microsoft-breakpoint-id-rkbp5uvrq has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"min-height:585px\" data-microsoft-breakpoint-id=\"rkbp5uvrq\"><div style=\"--stories-carousel-all-text-color: #fff; --stories-carousel-all-background-color: #2a446f; --stories-carousel-filter-text-color: #000; --stories-carousel-filter-background-color: #8dc8e8; --stories-carousel-card-background-color: #8dc8e8; --stories-carousel-card-text-color: #000; --stories-carousel-card-hover-background-color: #152237; --stories-carousel-card-hover-text-color: #fff;\" class=\"stories-carousel-block alignwide wp-block-microsoft-core-stories-carousel\" data-filter-taxonomy=\"category\">\n\t\n\t\t<nav class=\"stories-carousel-filter-buttons wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex block-visibility-hide-small-screen stories-carousel-filters\">\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<button class=\"is-active has-text-color has-background has-link-color wp-element-button stories-carousel-filter\" data-filter=\"all\" data-bi-ct=\"button\" data-bi-cn=\"ALL\" type=\"button\"> ALL <\/button>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"wp-block-button is-style-default\">\n\t\t\t\t\t<button class=\" has-text-color has-background has-link-color wp-element-button stories-carousel-filter\" data-filter=\"government\" data-bi-ct=\"button\" data-bi-cn=\"GOVERNMENT\" type=\"button\"> GOVERNMENT <\/button>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"wp-block-button is-style-default\">\n\t\t\t\t\t<button class=\" has-text-color has-background has-link-color wp-element-button stories-carousel-filter\" data-filter=\"industry\" data-bi-ct=\"button\" data-bi-cn=\"INDUSTRY\" type=\"button\"> INDUSTRY <\/button>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"wp-block-button is-style-default\">\n\t\t\t\t\t<button class=\" has-text-color has-background has-link-color wp-element-button stories-carousel-filter\" data-filter=\"international-coalitions\" data-bi-ct=\"button\" data-bi-cn=\"INTERNATIONAL COALITIONS\" type=\"button\"> INTERNATIONAL COALITIONS <\/button>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"wp-block-button is-style-default\">\n\t\t\t\t\t<button class=\" has-text-color has-background has-link-color wp-element-button stories-carousel-filter\" data-filter=\"law-enforcement\" data-bi-ct=\"button\" data-bi-cn=\"LAW ENFORCEMENT\" type=\"button\"> LAW ENFORCEMENT <\/button>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"wp-block-button is-style-default\">\n\t\t\t\t\t<button class=\" has-text-color has-background has-link-color wp-element-button stories-carousel-filter\" data-filter=\"policy-experts\" data-bi-ct=\"button\" data-bi-cn=\"POLICY EXPERTS\" type=\"button\"> POLICY EXPERTS <\/button>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/nav>\n\n\t\t<nav class=\"stories-carousel-filter-dropdown block-visibility-show-small-screen\">\n\t\t\t<select name=\"stories-carousel-602c680d-1-select\" class=\"stories-carousel-filter-select\" aria-label=\"Filter stories\">\n\t\t\t\t\t\t\t\t\t<option value=\"all\" selected>\n\t\t\t\t\t\tALL\t\t\t\t\t<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"government\">\n\t\t\t\t\t\tGOVERNMENT\t\t\t\t\t<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"industry\">\n\t\t\t\t\t\tINDUSTRY\t\t\t\t\t<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"international-coalitions\">\n\t\t\t\t\t\tINTERNATIONAL COALITIONS\t\t\t\t\t<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"law-enforcement\">\n\t\t\t\t\t\tLAW ENFORCEMENT\t\t\t\t\t<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"policy-experts\">\n\t\t\t\t\t\tPOLICY EXPERTS\t\t\t\t\t<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/nav>\n\t\n\t<div class=\"stories-carousel-container wp-block-query-carousel\" data-swiper-config='{\"showOverflow\":false,\"responsive\":{\"mobile\":{\"enabled\":true,\"spaceBetween\":40,\"autoHeight\":false,\"loop\":false,\"autoplay\":false,\"autoplayDelay\":3000,\"navigation\":true,\"pagination\":false,\"columns\":1},\"tablet\":{\"enabled\":true,\"spaceBetween\":40,\"autoHeight\":false,\"loop\":true,\"autoplay\":false,\"autoplayDelay\":3000,\"navigation\":true,\"pagination\":true,\"columns\":2},\"desktop\":{\"enabled\":true,\"spaceBetween\":40,\"autoHeight\":false,\"loop\":false,\"autoplay\":false,\"navigation\":true,\"pagination\":true,\"columns\":3.14}}}'>\n\t\t<div class=\"swiper-wrapper\">\n\t\t\t<div class=\"swiper-slide\">\n\t<div id=\"story-3233\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-1 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-1\" data-swiper-slide-index=\"0\" data-story-id=\"3233\" data-taxonomy-terms=\"government international-coalitions\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"117\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg\" class=\"wp-image-3250\" alt=\"Stylized head shots of Nemanja &ldquo;Neno&rdquo; Malisevic and Kaja Ciglic, Senior Directors of Digital Diplomacy at Microsoft.\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg 2560w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-300x93.jpg 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-1024x318.jpg 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-768x239.jpg 768w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-1536x478.jpg 1536w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-2048x637.jpg 2048w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Cyberspace and the future of global diplomacy<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Cyberspace and the future of global diplomacy\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/\" data-bi-cn=\"\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-3162\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-2 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/redvds\/\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-2\" data-swiper-slide-index=\"1\" data-story-id=\"3162\" data-taxonomy-terms=\"cybersecurity law-enforcement\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"156\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/02\/CELA_RedVDS_1920x800.jpg\" class=\"wp-image-3163\" alt=\"An illustration of a shadowy, masked figure, partially obscured by an email message with a red warning symbol.\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/02\/CELA_RedVDS_1920x800.jpg 1920w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/02\/CELA_RedVDS_1920x800-300x125.jpg 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/02\/CELA_RedVDS_1920x800-1024x427.jpg 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/02\/CELA_RedVDS_1920x800-768x320.jpg 768w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/02\/CELA_RedVDS_1920x800-1536x640.jpg 1536w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">RedVDS and the Invisible Infrastructure of Modern Cybercrime<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about RedVDS and the Invisible Infrastructure of Modern Cybercrime\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/redvds\/\" data-bi-cn=\"\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-3045\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-3 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/aka.ms\/StoryRaccoonO365\" data-clickable-new-tab=\"true\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-3\" data-swiper-slide-index=\"2\" data-story-id=\"3045\" data-taxonomy-terms=\"cybersecurity law-enforcement\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"196\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CELA_RaccoonO365_1200x630-768x403.png\" class=\"wp-image-3020\" alt=\"An illustration of silhouetted investigators shining flashlights toward an underground maze where raccoons sit among Bitcoins, computer code, and login credentials.\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CELA_RaccoonO365_1200x630-768x403.png 768w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CELA_RaccoonO365_1200x630-300x158.png 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CELA_RaccoonO365_1200x630-1024x538.png 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CELA_RaccoonO365_1200x630.png 1200w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Inside the takedown of RaccoonO365: How Phishing-as-a-Service fuels ransomware&rsquo;s engine<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Inside the takedown of RaccoonO365: How Phishing-as-a-Service fuels ransomware&rsquo;s engine\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/aka.ms\/StoryRaccoonO365\" data-bi-cn=\"\" target=\"_blank\" rel=\"noopener noreferrer\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-3033\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-4 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/aka.ms\/StoryQuantumQA\" data-clickable-new-tab=\"true\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-4\" data-swiper-slide-index=\"3\" data-story-id=\"3033\" data-taxonomy-terms=\"cybersecurity government\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"156\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png\" class=\"wp-image-2433\" alt=\"Kevin Reifsteck, Director for Cybersecurity Policy, and Emily Violi Benjamin, Senior Program Manager, Quantum Legal and Policy\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png 1920w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1-300x125.png 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1-1024x427.png 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1-768x320.png 768w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1-1536x640.png 1536w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Preparing for the quantum unknown<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Preparing for the quantum unknown\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/aka.ms\/StoryQuantumQA\" data-bi-cn=\"\" target=\"_blank\" rel=\"noopener noreferrer\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-2453\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-5 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-5\" data-swiper-slide-index=\"4\" data-story-id=\"2453\" data-taxonomy-terms=\"cybersecurity industry\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"188\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg\" class=\"wp-image-2454\" alt=\"An illustration of pedestrians walking near a business office.\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg 800w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142-300x150.jpg 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142-768x384.jpg 768w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Cybercrime-as-a-Service, Explained<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Cybercrime-as-a-Service, Explained\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/\" data-bi-cn=\"\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-3034\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-6 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/09\/16\/microsoft-seizes-338-websites-to-disrupt-rapidly-growing-raccoono365-phishing-service\/\" data-clickable-new-tab=\"true\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-6\" data-swiper-slide-index=\"5\" data-story-id=\"3034\" data-taxonomy-terms=\"cybersecurity law-enforcement\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"294\" height=\"196\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/Header-image-CST-page-Microsoft-vs.-RaccoonO365-1024x683-1.png\" class=\"wp-image-3035\" alt=\"Microsoft on the Issues: RaccoonO365 post\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/Header-image-CST-page-Microsoft-vs.-RaccoonO365-1024x683-1.png 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/Header-image-CST-page-Microsoft-vs.-RaccoonO365-1024x683-1-300x200.png 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/Header-image-CST-page-Microsoft-vs.-RaccoonO365-1024x683-1-768x512.png 768w\" sizes=\"auto, (max-width: 294px) 100vw, 294px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Microsoft&rsquo;s legal action targets RaccoonO365<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Microsoft&rsquo;s legal action targets RaccoonO365\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/09\/16\/microsoft-seizes-338-websites-to-disrupt-rapidly-growing-raccoono365-phishing-service\/\" data-bi-cn=\"\" target=\"_blank\" rel=\"noopener noreferrer\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-3040\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-7 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/aka.ms\/QSP\/policy-2025\" data-clickable-new-tab=\"true\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-7\" data-swiper-slide-index=\"6\" data-story-id=\"3040\" data-taxonomy-terms=\"international-coalitions\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"348\" height=\"196\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/6103442_FY26-Q1-Cybersecurity-Quantum-Blog-Header_V2-1-1024x576-1.webp\" class=\"wp-image-3041\" alt=\"Blog post: post-quantum resilience\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/6103442_FY26-Q1-Cybersecurity-Quantum-Blog-Header_V2-1-1024x576-1.webp 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/6103442_FY26-Q1-Cybersecurity-Quantum-Blog-Header_V2-1-1024x576-1-300x169.webp 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/6103442_FY26-Q1-Cybersecurity-Quantum-Blog-Header_V2-1-1024x576-1-768x432.webp 768w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Post-quantum resilience: building secure\nfoundations<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Post-quantum resilience: building secure\nfoundations\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/aka.ms\/QSP\/policy-2025\" data-bi-cn=\"\" target=\"_blank\" rel=\"noopener noreferrer\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-2457\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-8 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-8\" data-swiper-slide-index=\"7\" data-story-id=\"2457\" data-taxonomy-terms=\"cybersecurity law-enforcement\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"177\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg\" class=\"wp-image-2458\" alt=\"Richard Boscovich, assistant general counsel, DCU, in conversation during a meeting.\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg 800w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281-300x141.jpg 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281-768x362.jpg 768w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Microsoft&rsquo;s Digital Crimes Unit helps the law move at the speed of cybercrime<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Microsoft&rsquo;s Digital Crimes Unit helps the law move at the speed of cybercrime\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/\" data-bi-cn=\"\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-2438\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-9 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-9\" data-swiper-slide-index=\"8\" data-story-id=\"2438\" data-taxonomy-terms=\"cybersecurity policy-experts\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"176\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg\" class=\"wp-image-2439\" alt=\"Illustration of government buildings and digital data graphics.\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg 1920w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638-300x141.jpg 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638-1024x480.jpg 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638-768x360.jpg 768w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638-1536x720.jpg 1536w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">5 things you need to know about tracking today&rsquo;s nation-state threats<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about 5 things you need to know about tracking today&rsquo;s nation-state threats\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\" data-bi-cn=\"\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<div class=\"swiper-slide\">\n\t<div id=\"story-3037\" data-bi-ct=\"group\" class=\"wp-block-group has-background microsoft-breakpoint-id-stories-carousel-10 is-vertical is-content-justification-stretch is-layout-flex wp-block-group-is-layout-flex stories-carousel-item\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/05\/21\/microsoft-leads-global-action-against-favored-cybercrime-tool\/\" data-clickable-new-tab=\"true\" data-clickable-context=\"post\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"stories-carousel-10\" data-swiper-slide-index=\"9\" data-story-id=\"3037\" data-taxonomy-terms=\"law-enforcement\">\n\t\t\t\t\t<figure class=\"wp-block-image size-full\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"348\" height=\"196\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/FY25_Q4_PA_Cybersecurity__Blog-Header.webp\" class=\"wp-image-3038\" alt=\"Futuristic image of digital map interface showing Europe, Africa, and Asia with neon blue and red outlines, circular markers, and grid lines on a gradient blue-purple background, suggesting global tracking or cyber monitoring.\" srcset=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/FY25_Q4_PA_Cybersecurity__Blog-Header.webp 1920w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/FY25_Q4_PA_Cybersecurity__Blog-Header-300x169.webp 300w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/FY25_Q4_PA_Cybersecurity__Blog-Header-1024x576.webp 1024w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/FY25_Q4_PA_Cybersecurity__Blog-Header-768x432.webp 768w, https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/FY25_Q4_PA_Cybersecurity__Blog-Header-1536x864.webp 1536w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\">\t\t\t<\/figure>\n\t\t\t\t<h2 class=\"wp-block-heading\">Disrupting Lumma Stealer<\/h2>\n\t\t\t\t<div class=\"wp-block-buttons alignfull is-content-justification-space-between is-layout-flex wp-block-buttons-is-layout-flex stories-read-more\">\n\t\t\t<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\">\n\t\t\t\t<a aria-label=\"Read more about Disrupting Lumma Stealer\" data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon has-icon-only\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/05\/21\/microsoft-leads-global-action-against-favored-cybercrime-tool\/\" data-bi-cn=\"\" target=\"_blank\" rel=\"noopener noreferrer\">\n\t\t\t\t\t<span class=\"button-text\">\n\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<svg class=\"ignite-wp-icon\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\">\n\t\t\t\t\t\t<path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t<\/div>\n\n\t\t<div class=\"swiper-pagination\"><\/div>\n\n\t\t<div class=\"swiper-navigation\">\n\t\t\t<button role=\"button\" aria-label=\"Swipe to previous item\" class=\"swiper-button-prev show-mobile show-tablet show-desktop\"><\/button>\n\t\t\t<button role=\"button\" aria-label=\"Swipe to next item\" class=\"swiper-button-next show-mobile show-tablet show-desktop\"><\/button>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-black-color has-deep-blue-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-3fjji1itm wp-elements-f7507441570bfab29be1b36a3f96095a has-global-padding is-layout-constrained wp-container-core-group-is-layout-19e250f3 wp-block-group-is-layout-constrained\" id=\"timeline\" data-microsoft-breakpoint-id=\"3fjji1itm\"><div class=\"wp-block-columns alignwide are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-d52794c9 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\"><div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:43.5%\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide microsoft-breakpoint-id-0e5ftj2sc has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-7925b49a wp-block-group-is-layout-constrained\" data-microsoft-breakpoint-id=\"0e5ftj2sc\"><hr style=\"border-top-width: 2px;;border-bottom: none;\" class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background\">\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-clear-blue-color has-text-color has-link-color wp-elements-0d766f195e274d1034faea60a78fe5aa\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\">Microsoft&rsquo;s Digital Crimes Unit<\/h2>\n<\/div>\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:0;padding-right:0\"><p class=\"has-clear-blue-color has-text-color has-link-color wp-elements-3c02d65d19ddf8c3ca1ca304fac9df6e wp-block-paragraph\" style=\"padding-top:0;padding-bottom:0\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/customer-security-trust\/digital-crimes-unit\" data-bi-cn=\"Microsoft&rsquo;s Digital Crimes Unit (DCU)\">Microsoft&rsquo;s Digital Crimes Unit (DCU) <\/a>uses court-authorized civil litigation and technical action to disrupt cybercriminal and nation-state infrastructure. This timeline highlights decades of DCU operations and recognizes that cybercrime disruption is often continuous, not one-and-done, as adversaries adapt. These actions protect victims by stopping active harm, enabling remediation, and preventing further losses&mdash;while imposing real costs on criminals by dismantling infrastructure, disrupting revenue streams, and forcing them to rebuild at greater risk and expense.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-brown-black-color has-soft-sky-glow-gradient-background has-text-color has-background has-link-color microsoft-breakpoint-id-0sqm00sgd wp-elements-52b4ef565add868841db2d42e2a38acc has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\" data-microsoft-breakpoint-id=\"0sqm00sgd\"><div style=\"--tag-id-bg-tag-k0jvx7t: #8dc8e8; --tag-id-fg-tag-k0jvx7t: #000; --tag-id-bg-tag-duhcisk: #b9dcd2; --tag-id-fg-tag-duhcisk: #000; --tag-id-bg-tag-cos2gjr: #c5b4e3; --tag-id-fg-tag-cos2gjr: var(--tag-fg-background); --tag-id-bg-tag-3gf5rgd: #ffa38b; --tag-id-fg-tag-3gf5rgd: var(--tag-fg-background); --tag-id-bg-tag-30wvzs9: #a0d2c7; --tag-id-fg-tag-30wvzs9: var(--tag-fg-background); --tag-id-bg-tag-5utjqi0: #ffe399; --tag-id-fg-tag-5utjqi0: var(--tag-fg-background)\" class=\"alignwide wp-block-microsoft-timeline-timeline\" aria-live=\"polite\">\n\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-ke2qwa7t8 is-horizontal is-nowrap is-layout-flex wp-container-core-group-is-layout-109177ae wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"ke2qwa7t8\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-7ruit4a0m is-layout-flow wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"7ruit4a0m\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-926ix1ncv has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-7322a030 wp-block-group-is-layout-constrained\" data-microsoft-breakpoint-id=\"926ix1ncv\"><hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Disrupting cyberthreats since 2008<\/h2>\n\n\n<p class=\"wp-block-paragraph\">For more than a decade, Microsoft&rsquo;s DCU has persistently disrupted cybercrime and nation&#8209;state threats targeting people, organizations and critical infrastructure. Explore major disruptions and the often&#8209;ongoing cases and operations behind them.<\/p>\n\n\n<div style=\"height:135px\" aria-hidden=\"true\" class=\"wp-block-spacer block-visibility-hide-small-screen\"><\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-kwvndwstv wp-container-content-e29552f7 is-nowrap is-layout-flex wp-container-core-group-is-layout-f66f9956 wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"kwvndwstv\"><div class=\"wp-block-microsoft-timeline-timeline-years\">\n\t<dl class=\"timeline__line\">\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2026\">\n\t\t\t\t\t\t<span>2026<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#tycoon-2fa\" aria-label=\"Navigate to Tycoon 2FA\" data-event-index=\"0\" class=\"is-selected\" data-bi-cn=\"Navigate to Tycoon 2FA\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#redvds\" aria-label=\"Navigate to RedVDS\" data-event-index=\"1\" data-bi-cn=\"Navigate to RedVDS\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2025\">\n\t\t\t\t\t\t<span>2025<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#raccoono365\" aria-label=\"Navigate to RaccoonO365\" data-event-index=\"2\" data-bi-cn=\"Navigate to RaccoonO365\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#lumma-stealer\" aria-label=\"Navigate to Lumma Stealer\" data-event-index=\"3\" data-bi-cn=\"Navigate to Lumma Stealer\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 3\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2024\">\n\t\t\t\t\t\t<span>2024<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#fizzdogg\" aria-label=\"Navigate to FizzDogg\" data-event-index=\"4\" data-bi-cn=\"Navigate to FizzDogg\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#fake-onnx\" aria-label=\"Navigate to Fake ONNX\" data-event-index=\"5\" data-bi-cn=\"Navigate to Fake ONNX\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 3\">\n\t\t\t\t\t\t<a href=\"#star-blizzard\" aria-label=\"Navigate to Star Blizzard\" data-event-index=\"6\" data-bi-cn=\"Navigate to Star Blizzard\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2023\">\n\t\t\t\t\t\t<span>2023<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#storm-1152\" aria-label=\"Navigate to Storm-1152\" data-event-index=\"7\" data-bi-cn=\"Navigate to Storm-1152\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#cracked-cobalt-strike\" aria-label=\"Navigate to Cracked Cobalt Strike\" data-event-index=\"8\" data-bi-cn=\"Navigate to Cracked Cobalt Strike\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2022\">\n\t\t\t\t\t\t<span>2022<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#smoke-sandstorm\" aria-label=\"Navigate to Smoke Sandstorm\" data-event-index=\"9\" data-bi-cn=\"Navigate to Smoke Sandstorm\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#zloader\" aria-label=\"Navigate to ZLoader\" data-event-index=\"10\" data-bi-cn=\"Navigate to ZLoader\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2021\">\n\t\t\t\t\t\t<span>2021<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#nylon-typhoon\" aria-label=\"Navigate to Nylon Typhoon\" data-event-index=\"11\" data-bi-cn=\"Navigate to Nylon Typhoon\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#emotet\" aria-label=\"Navigate to Emotet\" data-event-index=\"12\" data-bi-cn=\"Navigate to Emotet\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2020\">\n\t\t\t\t\t\t<span>2020<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#trickbot\" aria-label=\"Navigate to Trickbot\" data-event-index=\"13\" data-bi-cn=\"Navigate to Trickbot\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#necurs\" aria-label=\"Navigate to Necurs\" data-event-index=\"14\" data-bi-cn=\"Navigate to Necurs\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2019\">\n\t\t\t\t\t\t<span>2019<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#emerald-sleet\" aria-label=\"Navigate to Emerald Sleet\" data-event-index=\"15\" data-bi-cn=\"Navigate to Emerald Sleet\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#mint-sandstorm\" aria-label=\"Navigate to Mint Sandstorm\" data-event-index=\"16\" data-bi-cn=\"Navigate to Mint Sandstorm\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2018\">\n\t\t\t\t\t\t<span>2018<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 3\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2017\">\n\t\t\t\t\t\t<span>2017<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#gamarue\" aria-label=\"Navigate to Gamarue\" data-event-index=\"17\" data-bi-cn=\"Navigate to Gamarue\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#avalanche\" aria-label=\"Navigate to Avalanche\" data-event-index=\"18\" data-bi-cn=\"Navigate to Avalanche\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 3\">\n\t\t\t\t\t\t<a href=\"#brass-typhoon\" aria-label=\"Navigate to Brass Typhoon\" data-event-index=\"19\" data-bi-cn=\"Navigate to Brass Typhoon\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 1\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2016\">\n\t\t\t\t\t\t<span>2016<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#forest-blizzard\" aria-label=\"Navigate to Forest Blizzard\" data-event-index=\"20\" data-bi-cn=\"Navigate to Forest Blizzard\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 3\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2015\">\n\t\t\t\t\t\t<span>2015<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#dorkbot\" aria-label=\"Navigate to Dorkbot\" data-event-index=\"21\" data-bi-cn=\"Navigate to Dorkbot\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#simda\" aria-label=\"Navigate to Simda\" data-event-index=\"22\" data-bi-cn=\"Navigate to Simda\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 3\">\n\t\t\t\t\t\t<a href=\"#ramnit\" aria-label=\"Navigate to Ramnit\" data-event-index=\"23\" data-bi-cn=\"Navigate to Ramnit\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 3\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2014\">\n\t\t\t\t\t\t<span>2014<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#caphaw\" aria-label=\"Navigate to Caphaw\" data-event-index=\"24\" data-bi-cn=\"Navigate to Caphaw\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#gameover-zeus\" aria-label=\"Navigate to GameOver Zeus\" data-event-index=\"25\" data-bi-cn=\"Navigate to GameOver Zeus\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 3\">\n\t\t\t\t\t\t<a href=\"#bladabindi-jenxcus\" aria-label=\"Navigate to Bladabindi &amp; Jenxcus\" data-event-index=\"26\" data-bi-cn=\"Navigate to Bladabindi &amp;amp; Jenxcus\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 3\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2013\">\n\t\t\t\t\t\t<span>2013<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#zeroaccess\" aria-label=\"Navigate to ZeroAccess\" data-event-index=\"27\" data-bi-cn=\"Navigate to ZeroAccess\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#citadel\" aria-label=\"Navigate to Citadel\" data-event-index=\"28\" data-bi-cn=\"Navigate to Citadel\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 3\">\n\t\t\t\t\t\t<a href=\"#bamital\" aria-label=\"Navigate to Bamital\" data-event-index=\"29\" data-bi-cn=\"Navigate to Bamital\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2012\">\n\t\t\t\t\t\t<span>2012<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#nitol\" aria-label=\"Navigate to Nitol\" data-event-index=\"30\" data-bi-cn=\"Navigate to Nitol\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#zeus\" aria-label=\"Navigate to Zeus\" data-event-index=\"31\" data-bi-cn=\"Navigate to Zeus\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2011\">\n\t\t\t\t\t\t<span>2011<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#kelihos\" aria-label=\"Navigate to Kelihos\" data-event-index=\"32\" data-bi-cn=\"Navigate to Kelihos\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#rustock\" aria-label=\"Navigate to Rustock\" data-event-index=\"33\" data-bi-cn=\"Navigate to Rustock\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"timeline__group\" style=\"--timeline-events-per-group: 2\">\n\t\t\t\t<dt class=\"timeline__year\">\n\t\t\t\t\t<time datetime=\"2010\">\n\t\t\t\t\t\t<span>2010<\/span>\n\t\t\t\t\t<\/time>\n\t\t\t\t<\/dt>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 1\">\n\t\t\t\t\t\t<a href=\"#conficker\" aria-label=\"Navigate to Conficker\" data-event-index=\"34\" data-bi-cn=\"Navigate to Conficker\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<dd class=\"timeline__events\" style=\"--timeline-event-index: 2\">\n\t\t\t\t\t\t<a href=\"#waledac\" aria-label=\"Navigate to Waledac\" data-event-index=\"35\" data-bi-cn=\"Navigate to Waledac\">\n\t\t\t\t\t\t\t<span class=\"marker\"><\/span>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/dd>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/dl>\n\t\t\t\t\t\t<span class=\"timeline__tooltip is-initializing\">\n\t\t\t<span class=\"timeline__tooltip-label\">\n\t\t\t\t<span>Click or scroll to explore the timeline.<\/span>\n\t\t\t<\/span>\n\t\t\t<button type=\"button\" class=\"timeline__tooltip-icon\" aria-label=\"More information\">i<\/button>\n\t\t<\/span>\n\t<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-pqqqy202u is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-c6e5b353 wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"pqqqy202u\"><div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-9760934e\"><\/div>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"tycoon-2fa\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">February 2026<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(16.834px, 1.052rem + ((1vw - 3.9px) * 0.865), 26px)\">Tycoon 2FA<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Tycoon 2FA is a phishing&#8209;as&#8209;a&#8209;service operation that lets cybercriminals impersonate users and access email and online services&mdash;even with MFA enabled. It reflects a broader shift in cybercrime: identity is now the primary target, where one account can unlock entire digital ecosystems.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fblogs.microsoft.com%2Fon-the-issues%2F2026%2F03%2F04%2Fhow-a-global-coalition-disrupted-tycoon%2F&amp;data=05%7C02%7Cv-flmiller%40microsoft.com%7C56f7799646124ec3258b08de7adb596a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639083279739755169%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=eKVy9mYWxweNxeSDlQPsba2tYdlwVfJLz1fe34CvcEc%3D&amp;reserved=0\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn more\">Learn more <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"redvds\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">January 2026<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">RedVDS<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-cos2gjr, #c5b4e3);color: var(--tag-id-fg-tag-cos2gjr, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-cos2gjr\">\n\tAI abuse<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">RedVDS was a subscription-based service that enabled cybercriminals to run mass phishing, account takeovers, and financial fraud using anonymous virtual machines, amplified by AI-driven face-swapping, voice cloning, and video manipulation to enhance deception.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2026\/01\/14\/microsoft-disrupts-cybercrime\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn more\">Learn more <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"raccoono365\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">September 2025<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">RaccoonO365<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-cos2gjr, #c5b4e3);color: var(--tag-id-fg-tag-cos2gjr, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-cos2gjr\">\n\tAI abuse<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">RaccoonO365 was a phishing-as-a-service threat that used AI-assisted tooling, realistic lures, and CAPTCHA evasion to harvest Microsoft 365 credentials at scale, lowering the barrier for criminals to launch highly convincing attacks.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/raccoono365\/\" style=\"font-style:normal;font-weight:600\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"lumma-stealer\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">May 2025<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Lumma&nbsp;Stealer<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-30wvzs9, #a0d2c7);color: var(--tag-id-fg-tag-30wvzs9, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-30wvzs9\">\n\tRansomware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Lumma Stealer industrialized data theft by pairing malware-as-a-service with AI-enabled social engineering, automated loaders, and adaptive infrastructure, allowing criminals to steal credentials and sensitive information with minimal effort.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/05\/21\/microsoft-leads-global-action-against-favored-cybercrime-tool\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"fizzdogg\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">December 2024<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">FizzDogg<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-cos2gjr, #c5b4e3);color: var(--tag-id-fg-tag-cos2gjr, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-cos2gjr\">\n\tAI abuse<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">FizzDogg, tracked as Storm&#8209;2139, ran a cybercrime&#8209;as&#8209;a&#8209;service that weaponized generative AI&mdash;bypassing safeguards and monetizing illicit access to produce and share harmful, policy&#8209;violating images at scale.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/news.microsoft.com\/source\/features\/ai\/how-microsoft-is-taking-down-ai-hackers-who-create-harmful-images-of-celebrities-and-others\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"fake-onnx\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">November 2024<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Fake ONNX<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Fake ONNX, also known as Caffeine, was a phishing-as-a-service threat that fraudulently used the ONNX name to sell DIY phishing kits, enabling large-scale credential theft by industrializing MFA bypass and adversary-in-the-middle attack techniques.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/11\/21\/targeting-the-cybercrime-supply-chain\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"star-blizzard\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">September 2024<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Star Blizzard<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-5utjqi0, #ffe399);color: var(--tag-id-fg-tag-5utjqi0, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-5utjqi0\">\n\tnation-state<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Star Blizzard is a Russian nation-state threat that uses targeted spear-phishing and credential theft to exfiltrate sensitive information and interfere with the work of journalists, think tanks, NGOs, and other civil society organizations critical to democratic processes.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/03\/protecting-democratic-institutions-from-cyber-threats\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"storm-1152\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">September 2023<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Storm-1152<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-cos2gjr, #c5b4e3);color: var(--tag-id-fg-tag-cos2gjr, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-cos2gjr\">\n\tAI abuse<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Storm-1152 is a cybercrime-as-a-service threat that acts as a gateway to cybercrime by using highly automated, AI-assisted tools to create and sell massive volumes of fraudulent Microsoft accounts, enabling phishing, fraud, identity theft, and other abuse at scale.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2023\/12\/13\/cybercrime-cybersecurity-storm-1152-fraudulent-accounts\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noopener noreferrer\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"cracked-cobalt-strike\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">April 2023<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Cracked Cobalt Strike<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-30wvzs9, #a0d2c7);color: var(--tag-id-fg-tag-30wvzs9, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-30wvzs9\">\n\tRansomware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Cracked Cobalt Strike refers to illegally modified, legacy versions of Fortra&rsquo;s legitimate security tool that cybercriminals repurposed to enable automated command-and-control, lateral movement, and ransomware deployment at scale across victim networks.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2023\/04\/06\/stopping-cybercriminals-from-abusing-security-tools\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"smoke-sandstorm\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">May 2022<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Smoke Sandstorm<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-5utjqi0, #ffe399);color: var(--tag-id-fg-tag-5utjqi0, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-5utjqi0\">\n\tnation-state<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Smoke Sandstorm is an Iranian nation-state threat that uses targeted spear-phishing and social-engineering lures&mdash;often posing as recruiters&mdash;to compromise email accounts and gain persistent access for espionage across government, defense, and critical sectors. Previously tracked as Bohrium.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/threat-landscape\/smoke-sandstorm\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"zloader\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">April 2022<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">ZLoader<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-30wvzs9, #a0d2c7);color: var(--tag-id-fg-tag-30wvzs9, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-30wvzs9\">\n\tRansomware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">ZLoader is a malware-as-a-service botnet operated by an organized criminal gang whose goal is to steal and extort money by disabling security tools and distributing follow-on malware, including ransomware, across infected devices worldwide.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/04\/13\/zloader-botnet-disrupted-malware-ukraine\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"nylon-typhoon\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">December 2021<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Nylon Typhoon<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-5utjqi0, #ffe399);color: var(--tag-id-fg-tag-5utjqi0, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-5utjqi0\">\n\tnation-state<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-30wvzs9, #a0d2c7);color: var(--tag-id-fg-tag-30wvzs9, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-30wvzs9\">\n\tRansomware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Nylon Typhoon is a China based nation-state cyberespionage threat that exploits unpatched systems and remote access services to steal credentials and maintain long-term access, primarily targeting governments, diplomatic organizations and NGOs for intelligence collection. Previously tracked as Nickel.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/12\/06\/cyberattacks-nickel-dcu-china\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"emotet\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">March 2021<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Emotet<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Emotet is a globally dispersed banking trojan and malware distribution botnet that spreads via spam and phishing emails, harvesting credentials, installing persistent backdoors, and delivering additional malware.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/world%e2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"trickbot\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">October 2020<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Trickbot<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-30wvzs9, #a0d2c7);color: var(--tag-id-fg-tag-30wvzs9, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-30wvzs9\">\n\tRansomware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Trickbot was a globally dispersed banking trojan and malware distribution botnet that spread via phishing emails. It evolved to abuse compromised IoT routers as part of its command-and-control infrastructure, while infected systems harvested credentials, disabled security tools, and delivered additional malware.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/10\/12\/trickbot-ransomware-cyberthreat-us-elections\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"necurs\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">March 2020<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Necurs<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-30wvzs9, #a0d2c7);color: var(--tag-id-fg-tag-30wvzs9, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-30wvzs9\">\n\tRansomware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Necurs was one of the world&rsquo;s largest criminal botnets, used as a botnet-for-hire to distribute malware, spam, and financial scams at global scale, enabling credential theft, ransomware delivery, and other cybercrime activity.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/03\/10\/necurs-botnet-cyber-crime-disrupt\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"emerald-sleet\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">December 2019<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Emerald Sleet<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-5utjqi0, #ffe399);color: var(--tag-id-fg-tag-5utjqi0, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-5utjqi0\">\n\tnation-state<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Emerald Sleet is a North Korea-based cyberespionage threat actor targeting government employees, think tanks, university staff, and organizations focused on world peace, human rights, and nuclear nonproliferation&mdash;primarily in the United States, Japan, and South Korea. Previously tracked as Thallium.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2019\/12\/30\/microsoft-court-action-against-nation-state-cybercrime\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"mint-sandstorm\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">March 2019<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Mint Sandstorm<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-5utjqi0, #ffe399);color: var(--tag-id-fg-tag-5utjqi0, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-5utjqi0\">\n\tnation-state<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Mint Sandstorm is an Iran-based threat actor targeting prominent individuals in business and government through tailored phishing and social engineering to steal credentials, conduct surveillance, and support state espionage&mdash;frequently focusing on activists, journalists, and Middle East policy communities. Previously tracked as Phosphorus.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2019\/10\/04\/recent-cyberattacks-require-us-all-to-be-vigilant\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"gamarue\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">November 2017<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Gamarue<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Gamarue, also known as Andromeda, is a crimeware kit sold in hacker forums to monetize malware installs. It spread via email, social platforms, and USBs, disabled Windows security controls, and enabled largescale delivery of follow-on malware.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/andromeda-botnet-dismantled-in-international-cyber-operation\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"avalanche\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">November 2017<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Avalanche<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Avalanche was a criminal syndicate and botnet infrastructure used to conduct phishing, bank fraud, and ransomware at scale. It enabled malware hosting and distribution, credential and financial data theft, money-mule fraud schemes, and secondary attacks from compromised victim systems.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/%e2%80%98avalanche%e2%80%99-network-dismantled-in-international-cyber-operation\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"brass-typhoon\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">October 2017<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Brass Typhoon<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-5utjqi0, #ffe399);color: var(--tag-id-fg-tag-5utjqi0, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-5utjqi0\">\n\tnation-state<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Brass Typhoon is a China&ndash;based nation-state threat actor targeting gaming and internet content companies to steal sensitive data using custom malware with credential theft, exploitation, and exfiltration capabilities. Previously tracked as Barium.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.noticeofpleadings.net\/barium\/index.html\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"forest-blizzard\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">August 2016<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Forest Blizzard<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-5utjqi0, #ffe399);color: var(--tag-id-fg-tag-5utjqi0, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-5utjqi0\">\n\tnation-state<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Forest Blizzard is a Russia-based nation-state threat actor that targets democratic institutions, governments, and NGOs through cyberespionage and influence operations. It played a prominent role in election interference and escalated cyber activity at the outset of Russia&rsquo;s war against Ukraine. Previously tracked as Strontium.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2018\/08\/20\/we-are-taking-new-steps-against-broadening-threats-to-democracy\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"dorkbot\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">December 2015<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Dorkbot<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Dorkbot was a multicomponent malware family designed to disable security protections, steal credentials and personal data, and spread aggressively via USB drives, instant messaging, and social networks. It leveraged infected devices to distribute itself, download additional payloads, and operate as part of large botnets enabling persistent compromise.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2015\/12\/17\/cloud-power-disrupts-global-malware\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"simda\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">April 2015<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Simda<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Simda was a financial fraud botnet built from multiple modules that enabled banking credential theft, backdoor access, traffic manipulation, cryptocurrency mining, and delivery of additional malware. It spread via spam, exploit kits, and compromised websites, enabling persistent largescale compromise.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.interpol.int\/News-and-Events\/News\/2015\/INTERPOL-coordinates-global-operation-to-take-down-Simda-botnet\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"ramnit\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">February 2015<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Ramnit<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Ramnit is a financial fraud botnet focused on stealing online banking credentials. Its modular architecture enabled credential theft, web-inject attacks against banking sites, remote control of victim PCs, and disabling of security software. It spread via phishing emails and social networking platforms.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/eupolicy\/2015\/10\/22\/breaking-up-a-botnet-how-ramnit-was-foiled\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"caphaw\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">July 2014<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Caphaw<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Caphaw was a banking malware family that targeted major European financial institutions, enabling attackers to take full control of infected PCs and steal online banking credentials. It spread via social engineering on platforms like Facebook, YouTube, and Skype, as well as removable media and drive-by downloads.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2014\/09\/29\/microsoft-partners-financial-services-industry-fight-cybercrime\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"gameover-zeus\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">June 2014<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">GameOver Zeus<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">GameOver Zeus was a banking malware and botnet spread via spam and phishing that hijacked online banking sessions to steal credentials and funds. It also delivered ransomware, combining financial fraud with extortion to maximize criminal impact.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"\/\/blogs.microsoft.com\/blog\/2014\/06\/02\/microsoft-helps-fbi-in-gameover-zeus-botnet-cleanup\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"bladabindi-jenxcus\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">June 2014<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Bladabindi &amp; Jenxcus<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Bladabindi and Jenxcus were pervasive remote access malware families that enabled cybercriminals to take full control of victim PCs for fraud and data theft. Widely promoted on social media with step-by-step guides, they spread via infected USB drives and other malware, exposing millions of users to abuse at global scale. Also tracked as B106.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/blog\/2014\/06\/30\/microsoft-takes-on-global-cybercrime-epidemic-in-tenth-malware-disruption\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"zeroaccess\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">December 2013<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">ZeroAccess<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">ZeroAccess was a multicomponent Trojan and botnet designed to generate revenue through largescale pay-per-click fraud. It hijacked search results and redirected traffic to ads, driving illicit profits while exposing victims to additional malware, data theft, and broader online fraud. Also tracked as Sirefef.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/blog\/2013\/12\/05\/microsoft-europol-fbi-and-industry-partners-disrupt-notorious-zeroaccess-botnet-that-hijacks-search-results\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"citadel\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">June 2013<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Citadel<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Citadel was a sophisticated banking Trojan responsible for over $500M in losses, stealing credentials through keylogging and man-in-the-browser attacks. By injecting popups and monitoring web traffic on legitimate sites, it tricked victims into surrendering sensitive financial information.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2013\/06\/21\/initial-revelations-and-results-of-the-citadel-botnet-operation\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"bamital\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">June 2013<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Bamital<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Bamital was a click fraud and search hijacking malware that intercepted web traffic and redirected users to advertising and malicious sites to generate illicit revenue. Installed largely via drive by downloads, it stripped users of control and exposed them to identity theft and additional malware infections.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/blog\/2013\/02\/06\/microsoft-and-symantec-take-down-bamital-botnet-that-hijacks-online-searches\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"nitol\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">September 2012<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Nitol<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Nitol was a Trojan commonly bundled with corrupted peer-to-peer software that quietly conscripted infected PCs into botnets. Once active, it enabled large-scale DDoS attacks without user awareness, turning everyday consumer devices into infrastructure for disruptive cyberattacks.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/blog\/2012\/09\/13\/microsoft-disrupts-the-emerging-nitol-botnet-being-spread-through-an-unsecure-supply-chain\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"zeus\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">March 2012<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Zeus<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Zeus was a prolific keylogging botnet that captured banking credentials by recording keystrokes and intercepting online sessions. Distributed through spam and drive-by downloads, it enabled identity theft, unauthorized fund transfers, and large-scale financial fraud against unsuspecting users. Also tracked as Zbot.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/blog\/2012\/03\/25\/microsoft-and-financial-services-industry-leaders-target-cybercriminal-operations-from-zeus-botnets\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"kelihos\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">September 2011<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Kelihos<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-k0jvx7t, #8dc8e8);color: var(--tag-id-fg-tag-k0jvx7t, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-k0jvx7t\">\n\tCybercrime tools and services<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Kelihos was a highly adaptable botnet used to send massive spam campaigns, steal credentials and financial data, and download or execute additional malware. It enabled remote control of infected PCs, disabled security defenses, and installed ransomware or other payloads, making it a versatile and persistent cybercrime platform.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/blog\/2012\/02\/03\/update-on-kelihos-botnet-and-new-related-malware\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"rustock\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">March 2011<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Rustock<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n\n\n<span style=\"background-color: var(--tag-id-bg-tag-duhcisk, #b9dcd2);color: var(--tag-id-fg-tag-duhcisk, #000)\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-duhcisk\">\n\tFraud<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Rustock was a rootkit-enabled backdoor Trojan that powered one of the world&rsquo;s largest spam botnets, flooding the internet with tens of billions of emails daily. Its scale showed how stealthy malware could industrialize abuse and undermine trust at global scale.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2011\/07\/05\/battling-the-rustock-threat\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"conficker\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">February 2010<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Conficker<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Conficker was a fast-moving network worm that exploited shared networks and removable media to spread at scale. Once inside an environment, it enabled follow-on malware and spam distribution, turning trusted enterprise networks into engines of criminal propagation.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2011\/11\/22\/microsofts-digital-crimes-unit-talks-cybercrime-with-worm-author-mark-bowden\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<article class=\"wp-block-microsoft-timeline-timeline-item\" id=\"waledac\" data-tags=\"[]\">\n\t\t\t<span class=\"wp-block-microsoft-timeline-timeline-item__date\">February 2010<\/span>\n\t\t\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-fpuc0d436 is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:6px;margin-bottom:var(--wp--preset--spacing--md)\" data-microsoft-breakpoint-id=\"fpuc0d436\"><h2 class=\"wp-block-heading\" style=\"margin-top:0;margin-bottom:20px;font-size:clamp(24.034px, 1.502rem + ((1vw - 3.9px) * 1.506), 40px)\">Waledac<\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-mf2qc8ko9 is-layout-flex wp-container-core-group-is-layout-32277d3e wp-block-group-is-layout-flex\" data-microsoft-breakpoint-id=\"mf2qc8ko9\"><span style=\"background-color: var(--tag-id-bg-tag-3gf5rgd, #ffa38b);color: var(--tag-id-fg-tag-3gf5rgd, var(--tag-fg-fallback))\" class=\"wp-block-microsoft-timeline-timeline-tag\" data-tag-id=\"tag-3gf5rgd\">\n\tMalware<\/span>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Waledac was a sophisticated Trojan that powered large-scale cybercrime, harvesting email addresses to fuel massive spam campaigns. It also enabled denial-of-service attacks, malware delivery, data theft, and persistent control of infected systems at scale.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\"><div class=\"wp-block-button is-style-text\"><a data-bi-ct=\"button\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/blogs.microsoft.com\/blog\/2010\/02\/24\/cracking-down-on-botnets\/\" style=\"font-style:normal;font-weight:600\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Learn More\">Learn More <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n<\/article>\n\n\n<div class=\"timeline-nav-buttons is-sticky wp-block-microsoft-timeline-timeline-nav-buttons\">\n\t<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n\t\t<div class=\"wp-block-button is-style-outline timeline-nav-buttons__button timeline-nav-buttons__button--next\">\n\t\t\t<button type=\"button\" class=\"wp-block-button__link wp-element-button\" aria-label=\"Next event\">\n\t\t\t\t<svg width=\"14\" height=\"19\" viewbox=\"0 0 14 19\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M2.75691 17.6776L11.2422 9.19231L2.75691 0.707031\" fill=\"currentColor\"><\/path>\n\t\t\t\t<\/svg>\n\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div class=\"wp-block-button is-style-outline timeline-nav-buttons__button timeline-nav-buttons__button--prev\" aria-hidden=\"true\">\n\t\t\t<button type=\"button\" class=\"wp-block-button__link wp-element-button\" aria-label=\"Previous event\">\n\t\t\t\t<svg width=\"14\" height=\"19\" viewbox=\"0 0 14 19\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M11.2426 0.707173L2.75732 9.19245L11.2426 17.6777\" fill=\"currentColor\"><\/path>\n\t\t\t\t<\/svg>\n\t\t\t<\/button>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-deep-blue-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-wmdfkgjku wp-elements-4f93400f07aacf0b0cb65f6ef35310ac has-global-padding is-layout-constrained wp-container-core-group-is-layout-3d18c9c2 wp-block-group-is-layout-constrained block-visibility-hide-small-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--3-xl-fluid);padding-bottom:var(--wp--preset--spacing--3-xl-fluid)\" data-microsoft-breakpoint-id=\"wmdfkgjku\"><div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--clear-blue);border-top-width:2px\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:61%\"><div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-2208u8rkf is-nowrap is-layout-flex wp-container-core-group-is-layout-219a8a2c wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--sm);cursor:pointer\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"2208u8rkf\"><h2 class=\"wp-block-heading has-clear-blue-color has-text-color has-link-color wp-elements-98eac4ba9014d6d833d5ed1a1b2fe7df\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" data-bi-cn=\"Helping the law move &#8232;at the speed of cybercrime\">Helping the law move &#8232;at the speed of cybercrime<\/a><\/h2>\n\n\n<svg class=\"wp-elements-f6fa11d6ebfe2b27f3d3e9750ed97d0c wp-block-tenup-icon has-text-color has-clear-blue-color reacts-on-clickable-hover\" style=\"width: 40px; height: 40px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-d8c8668f wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--md)\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quote.png\" alt=\"\" class=\"wp-image-2584\" style=\"aspect-ratio:1;object-fit:cover;width:50px\"><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><p class=\"has-clear-blue-color has-text-color has-link-color has-segoe-serif-font-family wp-elements-78de7286bd343bc3bcfcd334ee4a7c6f wp-block-paragraph\" style=\"margin-top:0;padding-top:0;font-size:clamp(15.747px, 0.984rem + ((1vw - 3.9px) * 0.779), 24px);line-height:1.3\">Nation-state actors are much more sophisticated&#8232;and difficult to identify. They want to blend into traffic, and there are very few victims.&#8232;We had to devise new investigative techniques,&#8232;as well as adapt our legal techniques.<\/p>\n\n\n<p class=\"has-clear-blue-color has-text-color has-link-color has-segoe-sans-font-family wp-elements-fff46e9624cfaa15944b59749dd456f9 wp-block-paragraph\" style=\"margin-bottom:0;padding-bottom:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.566), 20px);font-style:normal;font-weight:600;line-height:1.3\">Richard Boscovich<\/p>\n\n\n<p class=\"has-clear-blue-color has-text-color has-link-color wp-elements-38873dfeff214c5593f24c528ed908c0 wp-block-paragraph\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--2-xs);font-size:14px;line-height:1.3\">Assistant General Counsel, Microsoft Digital Crimes Unit on the DCU&rsquo;s unique approach to disrupting malware threats<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-left:var(--wp--preset--spacing--lg);flex-basis:39%\"><figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" data-bi-cn=\"Richard Boscovich, assistant general counsel, DCU, in conversation during a meeting.\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/image-56-1.png\" alt=\"Richard Boscovich, assistant general counsel, DCU, in conversation during a meeting.\" class=\"wp-image-2542\" style=\"aspect-ratio:1;object-fit:cover\"><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-deep-blue-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-wmdfkgjku wp-elements-92ac04960e29cb76bb08933ce491bc7e is-layout-flow wp-block-group-is-layout-flow block-visibility-hide-large-screen block-visibility-hide-medium-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--3-xl-fluid);padding-right:var(--wp--preset--spacing--3-xl-fluid);padding-bottom:var(--wp--preset--spacing--3-xl-fluid);padding-left:var(--wp--preset--spacing--3-xl-fluid)\" data-microsoft-breakpoint-id=\"wmdfkgjku\"><figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" data-bi-cn=\"image-56-1\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/image-56-1.png\" alt=\"\" class=\"wp-image-2542\" style=\"width:486px\"><\/a><\/figure>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-hse28qqy4 is-nowrap is-layout-flex wp-container-core-group-is-layout-abb31105 wp-block-group-is-layout-flex\" style=\"padding-right:var(--wp--preset--spacing--md);padding-bottom:var(--wp--preset--spacing--sm);cursor:pointer\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"hse28qqy4\"><h2 class=\"wp-block-heading has-clear-blue-color has-text-color has-link-color wp-elements-efd24b535672733573ae70d341b3c35c\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" data-bi-cn=\"Helping the law move&#8232; at the speed of cybercrime\">Helping the law move&#8232; at the speed of cybercrime<\/a><\/h2>\n\n\n<svg class=\"wp-elements-f6fa11d6ebfe2b27f3d3e9750ed97d0c wp-block-tenup-icon has-text-color has-clear-blue-color reacts-on-clickable-hover\" style=\"width: 40px; height: 40px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignwide microsoft-breakpoint-id-atwmaigub is-nowrap is-layout-flex wp-container-core-group-is-layout-f66f9956 wp-block-group-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--clear-blue);border-top-width:2px\" data-microsoft-breakpoint-id=\"atwmaigub\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-cyudaj6bm has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--sm)\" data-microsoft-breakpoint-id=\"cyudaj6bm\"><div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quote.png\" alt=\"\" class=\"wp-image-2584\" style=\"width:50px\"><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><p class=\"has-clear-blue-color has-text-color has-link-color has-segoe-serif-font-family wp-elements-367641786e560cf3ce6be62f65b89957 wp-block-paragraph\" style=\"margin-top:0;padding-top:0;font-size:clamp(15.747px, 0.984rem + ((1vw - 3.9px) * 0.779), 24px);\">Nation-state actors are much more sophisticated&#8232; and difficult to identify. They want to blend into traffic, and there are very few victims. We had to devise new investigative techniques,&#8232; as well as adapt our legal techniques.<\/p>\n\n\n<p class=\"has-clear-blue-color has-text-color has-link-color has-segoe-sans-font-family wp-elements-5a23259fede53244d59dacf9976d4562 wp-block-paragraph\" style=\"margin-bottom:0;padding-bottom:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.566), 20px);font-style:normal;font-weight:600\">Richard Boscovich<\/p>\n\n\n<p class=\"has-clear-blue-color has-text-color has-link-color wp-elements-f733fdcc9a3a10dc79be35f61819b053 wp-block-paragraph\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--2-xs);font-size:14px;line-height:1.6\">Assistant General Counsel, Microsoft Digital Crimes Unit on the DCU&rsquo;s unique approach to disrupting malware threats<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-black-color has-white-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-0sqm00sgd wp-elements-d7ab74192a02b8e056495dfeefe09c62 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained block-visibility-hide-small-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\" data-microsoft-breakpoint-id=\"0sqm00sgd\"><div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-bottom is-media-expand-content\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:2px;padding-right:var(--wp--preset--spacing--sm);grid-template-columns:39% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\" data-bi-cn=\"Abstract world map composed of geometric shapes in blue and white tones. two yellow diagonal line...\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/image-56-2.png\" alt=\"Abstract world map composed of geometric shapes in blue and white tones. two yellow diagonal lines intersect across the map, with a yellow circle positioned in the upper left corner. the background is dark blue with subtle textured patterns. \" class=\"wp-image-2543 size-full\"><\/a><\/figure><div class=\"wp-block-media-text__content\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-27fxbk8ui is-vertical is-layout-flex wp-container-core-group-is-layout-0bc941e6 wp-block-group-is-layout-flex\" style=\"min-height:100%\" data-microsoft-breakpoint-id=\"27fxbk8ui\"><div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-hse28qqy4 is-nowrap is-layout-flex wp-container-core-group-is-layout-66e4060e wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--md);padding-right:var(--wp--preset--spacing--sm);cursor:pointer\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"hse28qqy4\"><h2 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-f6ac528d1b4759c86174b7066d0aabe1\" style=\"margin-right:var(--wp--preset--spacing--lg);padding-right:var(--wp--preset--spacing--xl-fluid);font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\" data-bi-cn=\"The institute helping&#8232; NGOs defend themselves\">The institute helping&#8232; NGOs defend themselves<\/a><\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-x08h3ynjg has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" data-microsoft-breakpoint-id=\"x08h3ynjg\"><svg class=\"wp-elements-b4493195f6cc655ac3380d465fecc343 wp-block-tenup-icon has-text-color has-brown-black-color wp-container-content-c0740251 reacts-on-clickable-hover\" style=\"width: 20px; height: 20px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-32229b3e wp-block-columns-is-layout-flex\"><div class=\"wp-block-column is-vertically-aligned-bottom is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-vertical is-layout-flex wp-container-core-group-is-layout-b444f201 wp-block-group-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;min-height:100%;padding-bottom:0\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-fe963a22435b739d23990acd241f65c0\" style=\"border-bottom-style:none;border-bottom-width:0px;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--sm);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">300,000 computers<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-ead5e837751a061bba5d414393eb8d6b wp-block-paragraph\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">In May 2017, a ransomware attack hit 300,000 computers in 150 countries in six hours<\/p>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-column is-vertically-aligned-bottom is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-vertical is-layout-flex wp-container-core-group-is-layout-10c6506b wp-block-group-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;min-height:100%\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-27656682c862ad4e4aa76456e2a2f4e1\" style=\"border-bottom-style:none;border-bottom-width:0px;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--sm);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">155,993 cyberattacks<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-35787b41524f2a2793dea86dabf6433a wp-block-paragraph\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">The CyberPeace Institute identified 155,993 cyberattacks against nonprofits<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull microsoft-breakpoint-id-9wpr7ulsk is-layout-flow wp-block-group-is-layout-flow block-visibility-hide-large-screen block-visibility-hide-medium-screen\" style=\"padding-top:var(--wp--preset--spacing--3-xl-fluid);padding-right:var(--wp--preset--spacing--3-xl-fluid);padding-bottom:var(--wp--preset--spacing--3-xl-fluid);padding-left:var(--wp--preset--spacing--3-xl-fluid)\" data-microsoft-breakpoint-id=\"9wpr7ulsk\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/image-56-2.png\" alt=\"\" class=\"wp-image-2543\" style=\"aspect-ratio:1;object-fit:cover;width:486px\"><\/figure>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-hse28qqy4 is-nowrap is-layout-flex wp-container-core-group-is-layout-f66f9956 wp-block-group-is-layout-flex\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"hse28qqy4\"><h2 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-01dd20ee2567809a21315b6e4f9339b2\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\" data-bi-cn=\"The institute helping&#8232; NGOs defend themselves\">The institute helping&#8232; NGOs defend themselves<\/a><\/h2>\n\n\n<svg class=\"wp-elements-9d119fcdcfb1211cc358d67dabe6efde wp-block-tenup-icon has-text-color has-brown-black-color reacts-on-clickable-hover\" style=\"width: 40px; height: 40px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-layout-flow wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-7418cf37ce22e5b3561046c8b8834c06\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;border-bottom-style:none;border-bottom-width:0px;padding-top:var(--wp--preset--spacing--xs);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">300,000 computers<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-0aaeaacb18883808618d78eae83725d4 wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--xs);margin-bottom:var(--wp--preset--spacing--xs);padding-top:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">In May 2017, a ransomware attack hit 300,000 computers in 150 countries in six hours<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-layout-flow wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-ab1d6ede3b02f0a2c0141f20bc90e112\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;border-bottom-style:none;border-bottom-width:0px;margin-top:var(--wp--preset--spacing--sm);padding-top:var(--wp--preset--spacing--xs);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">155,993 cyberattacks<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-00dd2668b68f0a55bed458d3ce21635e wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--xs);margin-bottom:var(--wp--preset--spacing--xs);padding-top:0;padding-bottom:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">The CyberPeace Institute identified 155,993 cyberattacks against nonprofits<\/p>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-light-blue-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-wmdfkgjku wp-elements-ebbaf1fa41c00ceaa63a739f500c000c has-global-padding is-layout-constrained wp-block-group-is-layout-constrained block-visibility-hide-small-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--3-xl-fluid);padding-bottom:var(--wp--preset--spacing--3-xl-fluid)\" data-microsoft-breakpoint-id=\"wmdfkgjku\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide microsoft-breakpoint-id-atwmaigub is-nowrap is-layout-flex wp-container-core-group-is-layout-f66f9956 wp-block-group-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--deep-blue);border-top-width:2px\" data-microsoft-breakpoint-id=\"atwmaigub\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-cyudaj6bm has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--sm)\" data-microsoft-breakpoint-id=\"cyudaj6bm\"><div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-hse28qqy4 is-nowrap is-layout-flex wp-container-core-group-is-layout-abb31105 wp-block-group-is-layout-flex\" style=\"padding-right:var(--wp--preset--spacing--md);padding-bottom:var(--wp--preset--spacing--sm);cursor:pointer\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/03\/protecting-democratic-institutions-from-cyber-threats\/\" data-clickable-new-tab=\"true\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"hse28qqy4\"><h2 class=\"wp-block-heading has-deep-blue-color has-text-color has-link-color wp-elements-528d6187066c5d452ec1c539155d0bc6\" style=\"margin-right:0;padding-right:0;font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/03\/protecting-democratic-institutions-from-cyber-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Protecting democratic institutions from cyber threats\">Protecting democratic institutions from cyber threats<\/a><\/h2>\n\n\n<svg class=\"wp-elements-9a5044e336a26de7e6a12fbc520c4014 wp-block-tenup-icon has-text-color has-deep-blue-color reacts-on-clickable-hover\" style=\"width: 40px; height: 40px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-3db7e2ea wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--lg);padding-right:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--lg)\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quote_deep.png\" alt=\"\" class=\"wp-image-2586\" style=\"width:50px\"><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><p class=\"has-deep-blue-color has-text-color has-link-color has-segoe-serif-font-family wp-elements-f536ce9d936d59a585d8bca6110871e2 wp-block-paragraph\" style=\"margin-top:0;padding-top:0;font-size:clamp(15.747px, 0.984rem + ((1vw - 3.9px) * 0.779), 24px);\">Star Blizzard&rsquo;s activities underscore the importance of upholding international norms to govern responsible state behavior online. Today&rsquo;s action is an example of the impact we can have against cybercrime when we work together.<\/p>\n\n\n<p class=\"has-deep-blue-color has-text-color has-link-color has-segoe-sans-font-family wp-elements-6b47706a9bab145ff3b55ab0bd2c545f wp-block-paragraph\" style=\"margin-bottom:0;padding-bottom:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.566), 20px);font-style:normal;font-weight:600\">Steven Masada<\/p>\n\n\n<p class=\"has-deep-blue-color has-text-color has-link-color wp-elements-1db7ac7f0f2f74079a163988c74d7919 wp-block-paragraph\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--2-xs);font-size:14px;line-height:1.6\">Assistant General Counsel, Microsoft Digital Crimes Unit on the DCU&rsquo;s unique approach to disrupting malware threats<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/03\/protecting-democratic-institutions-from-cyber-threats\/\" target=\"_blank\" rel=\" noreferrer noopener\" data-bi-cn=\"Read the blog about protecting democratic institutions from cyber threats and Microsoft&rsquo;s actio...\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Component-38-1.png\" alt=\"Read the blog about protecting democratic institutions from cyber threats and Microsoft&rsquo;s action against Star Blizzard \" class=\"wp-image-2544\" style=\"width:486px\"><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-light-blue-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-wmdfkgjku wp-elements-028b7915cf12d3fc7c9bf8e426f018de is-layout-flow wp-block-group-is-layout-flow block-visibility-hide-large-screen block-visibility-hide-medium-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--3-xl-fluid);padding-right:var(--wp--preset--spacing--3-xl-fluid);padding-bottom:var(--wp--preset--spacing--3-xl-fluid);padding-left:var(--wp--preset--spacing--3-xl-fluid)\" data-microsoft-breakpoint-id=\"wmdfkgjku\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Component-38-1.png\" alt=\"Read the blog about protecting democratic institutions from cyber threats and Microsoft&rsquo;s action against Star Blizzard \" class=\"wp-image-2544\" style=\"width:486px\"><\/figure>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-hse28qqy4 is-nowrap is-layout-flex wp-container-core-group-is-layout-abb31105 wp-block-group-is-layout-flex\" style=\"padding-right:var(--wp--preset--spacing--md);padding-bottom:var(--wp--preset--spacing--sm);cursor:pointer\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/03\/protecting-democratic-institutions-from-cyber-threats\/\" data-clickable-new-tab=\"true\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"hse28qqy4\"><h2 class=\"wp-block-heading has-deep-blue-color has-text-color has-link-color wp-elements-5f16aa83799f2d2ef5ec4a7abeebced5\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/03\/protecting-democratic-institutions-from-cyber-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Protecting democratic institutions from cyber threats\">Protecting democratic institutions from cyber threats<\/a><\/h2>\n\n\n<svg class=\"wp-elements-9a5044e336a26de7e6a12fbc520c4014 wp-block-tenup-icon has-text-color has-deep-blue-color reacts-on-clickable-hover\" style=\"width: 40px; height: 40px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignwide microsoft-breakpoint-id-atwmaigub is-nowrap is-layout-flex wp-container-core-group-is-layout-f66f9956 wp-block-group-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--deep-blue);border-top-width:2px\" data-microsoft-breakpoint-id=\"atwmaigub\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-cyudaj6bm has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--sm)\" data-microsoft-breakpoint-id=\"cyudaj6bm\"><div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quote_deep.png\" alt=\"\" class=\"wp-image-2586\" style=\"width:50px\"><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><p class=\"has-deep-blue-color has-text-color has-link-color has-segoe-serif-font-family wp-elements-f536ce9d936d59a585d8bca6110871e2 wp-block-paragraph\" style=\"margin-top:0;padding-top:0;font-size:clamp(15.747px, 0.984rem + ((1vw - 3.9px) * 0.779), 24px);\">Star Blizzard&rsquo;s activities underscore the importance of upholding international norms to govern responsible state behavior online. Today&rsquo;s action is an example of the impact we can have against cybercrime when we work together.<\/p>\n\n\n<p class=\"has-deep-blue-color has-text-color has-link-color has-segoe-sans-font-family wp-elements-6b47706a9bab145ff3b55ab0bd2c545f wp-block-paragraph\" style=\"margin-bottom:0;padding-bottom:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.566), 20px);font-style:normal;font-weight:600\">Steven Masada<\/p>\n\n\n<p class=\"has-deep-blue-color has-text-color has-link-color wp-elements-1db7ac7f0f2f74079a163988c74d7919 wp-block-paragraph\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--2-xs);font-size:14px;line-height:1.6\">Assistant General Counsel, Microsoft Digital Crimes Unit on the DCU&rsquo;s unique approach to disrupting malware threats<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull microsoft-breakpoint-id-pyavsbnsy is-layout-flow wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"pyavsbnsy\"><div class=\"wp-block-microsoft-embed-video wp-block-microsoft-embed-video-ump has-banner wp-block-microsoft-ump-ump-embed\" data-player-id=\"ump-69e5c7f7bcb40\" data-hide-content-on-play=\"true\">\n\t<script type=\"application\/json\" data-ump-config=\"ump-69e5c7f7bcb40\">\n\t{\"autoplay\":true,\"hideControls\":null,\"language\":\"en-us\",\"loop\":true,\"partnerName\":\"corporate-responsibility\",\"poster\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/image\\\/microsoftcorp\\\/DCU_video_en-us_tbmnl_en-us?wid=1280\",\"title\":\"Inside the high-security facility tackling digital threats\",\"sources\":[{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/DCU_video_en-us-0x1080-6439k\",\"type\":\"video\\\/mp4\",\"quality\":\"HQ\"},{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/DCU_video_en-us-0x720-3266k\",\"type\":\"video\\\/mp4\",\"quality\":\"HD\"},{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/DCU_video_en-us-0x540-2160k\",\"type\":\"video\\\/mp4\",\"quality\":\"SD\"},{\"src\":\"https:\\\/\\\/cdn-dynmedia-1.microsoft.com\\\/is\\\/content\\\/microsoftcorp\\\/DCU_video_en-us-0x360-958k\",\"type\":\"video\\\/mp4\",\"quality\":\"LO\"}]}\t<\/script>\n\n\t<div class=\"wp-block-microsoft-embed-video__video\" inert>\n\t\t\t\t<universal-media-player id=\"ump-69e5c7f7bcb40\"><\/universal-media-player>\n\n\t\t\t<\/div>\n\n\t<div class=\"wp-block-microsoft-embed-video__content\">\n\t\t<div class=\"wp-block-microsoft-embed-video__content-text\">\n\t\t\t\t\t\t<h2 class=\"wp-block-microsoft-embed-video__title\">Inside the high-security facility tackling digital threats<\/h2>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t<button type=\"button\" class=\"wp-block-microsoft-embed-video__button\" data-player-id=\"ump-69e5c7f7bcb40\" aria-label=\"Watch video\"><\/button>\n\t<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-brown-black-color has-clear-blue-fade-gradient-background has-text-color has-background has-link-color microsoft-breakpoint-id-0sqm00sgd wp-elements-e206fc441bc58d2217e84ce3fa6e137b has-global-padding is-layout-constrained wp-block-group-is-layout-constrained block-visibility-hide-small-screen\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\" data-microsoft-breakpoint-id=\"0sqm00sgd\"><div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-bottom is-media-expand-content block-visibility-hide-medium-screen block-visibility-hide-small-screen\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:2px;padding-right:var(--wp--preset--spacing--sm);grid-template-columns:39% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-bi-cn=\"Read the 2025 Microsoft Digital Defense Report\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/image-56-3.png\" alt=\"Read the 2025 Microsoft Digital Defense Report \" class=\"wp-image-2546 size-full\"><\/a><\/figure><div class=\"wp-block-media-text__content\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-27fxbk8ui is-vertical is-layout-flex wp-container-core-group-is-layout-0bc941e6 wp-block-group-is-layout-flex\" style=\"min-height:100%\" data-microsoft-breakpoint-id=\"27fxbk8ui\"><div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-hse28qqy4 is-nowrap is-layout-flex wp-container-core-group-is-layout-66e4060e wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--md);padding-right:var(--wp--preset--spacing--sm);cursor:pointer\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" data-microsoft-breakpoint-id=\"hse28qqy4\"><h2 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-ee7307af2f4d9292390d5bff2751dccd\" style=\"margin-right:var(--wp--preset--spacing--lg);padding-right:var(--wp--preset--spacing--xl-fluid);font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-bi-cn=\"Microsoft Digital Defense Report 2025\">Microsoft Digital Defense Report 2025<\/a><\/h2>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-x08h3ynjg has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" data-microsoft-breakpoint-id=\"x08h3ynjg\"><svg class=\"wp-elements-b4493195f6cc655ac3380d465fecc343 wp-block-tenup-icon has-text-color has-brown-black-color wp-container-content-c0740251 reacts-on-clickable-hover\" style=\"width: 20px; height: 20px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-32229b3e wp-block-columns-is-layout-flex\"><div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-c45a6050 wp-block-group-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;min-height:100%;padding-bottom:0\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-f254fd9a95a1e4e03b76549be325728b\" style=\"border-bottom-style:none;border-bottom-width:0px;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--sm);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">100 trillion security signals<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-028e2b7dfeca296468e6630a4620e001 wp-block-paragraph\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">Microsoft processes 100 trillion security signals daily, providing unparalleled insight into global cyber threats and helping organizations defend against increasingly sophisticated attacks<\/p>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-3b2997a9 wp-block-group-is-layout-flex\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;min-height:100%\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-d9a5020d51f7eb23a3f709e4f55e6347\" style=\"border-bottom-style:none;border-bottom-width:0px;padding-top:var(--wp--preset--spacing--2-xs);padding-bottom:var(--wp--preset--spacing--sm);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">5 billion emails<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-c96a16959858cda2bfb22779b4613044 wp-block-paragraph\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">5 billion emails screened daily on average to protect users from malware and phishing<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-clear-blue-fade-gradient-background has-background microsoft-breakpoint-id-9wpr7ulsk is-layout-flow wp-block-group-is-layout-flow block-visibility-hide-large-screen block-visibility-hide-medium-screen\" style=\"padding-top:var(--wp--preset--spacing--3-xl-fluid);padding-right:var(--wp--preset--spacing--3-xl-fluid);padding-bottom:var(--wp--preset--spacing--3-xl-fluid);padding-left:var(--wp--preset--spacing--3-xl-fluid)\" data-microsoft-breakpoint-id=\"9wpr7ulsk\"><figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-bi-cn=\"Read the 2025 Microsoft Digital Defense Report\"><img decoding=\"async\" src=\"https:\/\/celacampaindev.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/image-56-3.png\" alt=\"Read the 2025 Microsoft Digital Defense Report \" class=\"wp-image-2546\" style=\"aspect-ratio:1;object-fit:cover;width:486px\"><\/a><\/figure>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group temp-row-hover-underline microsoft-breakpoint-id-hse28qqy4 is-nowrap is-layout-flex wp-container-core-group-is-layout-f66f9956 wp-block-group-is-layout-flex\" data-is-clickable=\"true\" data-clickable-url=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-clickable-context=\"custom\" data-clickable-selector=\"\" tabindex=\"0\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"hse28qqy4\"><h2 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-a87bf62fe520d37f531d875cdafba935\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.9px) * 1.897), 48px);line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" data-bi-cn=\"Microsoft Digital Defense Report 2025\">Microsoft Digital Defense Report 2025<\/a><\/h2>\n\n\n<svg class=\"wp-elements-9d119fcdcfb1211cc358d67dabe6efde wp-block-tenup-icon has-text-color has-brown-black-color reacts-on-clickable-hover\" style=\"width: 40px; height: 40px; padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-layout-flow wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-321e5ca3e2eaf5b932a27e409ad2ff97\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;border-bottom-style:none;border-bottom-width:0px;padding-top:var(--wp--preset--spacing--xs);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">100 trillion security signals<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-86da457bb43d691ae64a3dcf6e586380 wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--xs);margin-bottom:var(--wp--preset--spacing--xs);padding-top:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">Microsoft processes 100 trillion security signals daily, providing unparalleled insight into global<br>cyber threats and helping organizations defend against increasingly sophisticated attacks<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-2fbj6hq3x is-layout-flow wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"2fbj6hq3x\"><h3 class=\"wp-block-heading has-brown-black-color has-text-color has-link-color wp-elements-b185235d5cecf6c70a9df8ea1557c1aa\" style=\"border-top-color:var(--wp--preset--color--brown-black);border-top-width:1px;border-bottom-style:none;border-bottom-width:0px;margin-top:var(--wp--preset--spacing--sm);padding-top:var(--wp--preset--spacing--xs);font-size:clamp(21.027px, 1.314rem + ((1vw - 3.9px) * 1.224), 34px);\">5 billion emails<\/h3>\n\n\n<p class=\"has-brown-black-color has-text-color has-link-color wp-elements-cb1fbec1808f2db6bb9e487e430860e5 wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--xs);margin-bottom:var(--wp--preset--spacing--xs);padding-top:0;padding-bottom:0;font-size:clamp(14px, 0.875rem + ((1vw - 3.9px) * 0.189), 16px);\">5 billion emails screened daily on average to protect users from malware and phishing<\/p>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-brown-black-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-b5cchxoa6 wp-elements-ca8b5b82949f4a96b552a247f3e7ceeb has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\" data-microsoft-breakpoint-id=\"b5cchxoa6\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\"><p class=\"wp-block-paragraph\">Follow us<\/p>\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-icon-color is-style-logos-only is-layout-flex wp-container-core-social-links-is-layout-78e58421 wp-block-social-links-is-layout-flex\"><li style=\"color:#fff;\" class=\"wp-social-link wp-social-link-linkedin has-white-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow LinkedIn\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"LinkedIn\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-on-the-issues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow LinkedIn\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;\" class=\"wp-social-link wp-social-link-x has-white-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow X\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"X\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/msftissues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow X\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;\" class=\"wp-social-link wp-social-link-instagram has-white-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow Instagram\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"Instagram\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.instagram.com\/msftissues\/\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow Instagram\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Explore Microsoft&rsquo;s approach to security through law, threat analysis, policy and diplomacy.Explore Microsoft&rsquo;s approach to security through law, threat analysis, policy and diplomacy.Microsoft&rsquo;s Digital Crimes UnitMicrosoft&rsquo;s Digital Crimes Unit (DCU) uses court-authorized civil litigation and technical action to disrupt cybercriminal and nation-state infrastructure. This timeline highlights decades of DCU operations and recognizes that cybercrime disruption [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":3031,"parent":2651,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_microsoft_sidebar_content":"","_microsoft_bottom_content":"","_microsoft_story_hero_content":"","_microsoft_story_content_prefix_content":"","_microsoft_story_content_suffix_content":"","_microsoft_author-bio_content":"","_microsoft_responsive_featured_images":[],"_microsoft_use_source_image":false,"_microsoft_color_scheme":"default","footnotes":""},"class_list":["post-3029","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity | Microsoft<\/title>\n<meta name=\"description\" content=\"Explore Microsoft&#039;s approach to protecting people, defending global institutions, and advancing digital trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity | Microsoft\" \/>\n<meta property=\"og:description\" content=\"Explore Microsoft&#039;s approach to protecting people, defending global institutions, and advancing digital trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Corporate Responsibility\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T14:08:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"767\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/\",\"name\":\"Cybersecurity | Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg\",\"datePublished\":\"2026-01-20T21:49:34+00:00\",\"dateModified\":\"2026-04-16T14:08:47+00:00\",\"description\":\"Explore Microsoft's approach to protecting people, defending global institutions, and advancing digital trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg\",\"contentUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg\",\"width\":2560,\"height\":767},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"en-us\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"corporate responsibility\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Topics\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/topics\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"name\":\"Corporate Responsibility\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\",\"name\":\"Corporate Responsibility\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corporate Responsibility\"},\"image\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity | Microsoft","description":"Explore Microsoft's approach to protecting people, defending global institutions, and advancing digital trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity | Microsoft","og_description":"Explore Microsoft's approach to protecting people, defending global institutions, and advancing digital trust.","og_url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/","og_site_name":"Microsoft Corporate Responsibility","article_modified_time":"2026-04-16T14:08:47+00:00","og_image":[{"width":2560,"height":767,"url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/","url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/","name":"Cybersecurity | Microsoft","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg","datePublished":"2026-01-20T21:49:34+00:00","dateModified":"2026-04-16T14:08:47+00:00","description":"Explore Microsoft's approach to protecting people, defending global institutions, and advancing digital trust.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#primaryimage","url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg","contentUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CST-hero-updated-scaled-1.jpeg","width":2560,"height":767},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/celacampaig.wpenginepowered.com\/"},{"@type":"ListItem","position":2,"name":"en-us","item":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/"},{"@type":"ListItem","position":3,"name":"corporate responsibility","item":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/"},{"@type":"ListItem","position":4,"name":"Topics","item":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/topics\/"},{"@type":"ListItem","position":5,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/celacampaig.wpenginepowered.com\/#website","url":"https:\/\/celacampaig.wpenginepowered.com\/","name":"Corporate Responsibility","description":"","publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization","name":"Corporate Responsibility","url":"https:\/\/celacampaig.wpenginepowered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corporate Responsibility"},"image":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages\/3029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/comments?post=3029"}],"version-history":[{"count":0,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages\/3029\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages\/2651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media\/3031"}],"wp:attachment":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media?parent=3029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}