{"id":2438,"date":"2025-08-28T10:00:00","date_gmt":"2025-08-28T17:00:00","guid":{"rendered":"https:\/\/celacampaindev.wpenginepowered.com\/?p=2438"},"modified":"2026-01-28T14:48:14","modified_gmt":"2026-01-28T22:48:14","slug":"5-things-threat-analyst","status":"publish","type":"post","link":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/","title":{"rendered":"5 things you need to know about tracking today\u2019s nation-state threats"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Nation-state influence operations are an increasingly dangerous aspect of the geopolitical landscape. Today, amid ongoing conflicts in Eastern Europe, South Asia, and the Middle East, threat analysts play a crucial role in helping governments protect their infrastructure and, ultimately, their people. Analysts for the Microsoft Threat Analysis Center (MTAC) detect and track nation-state threats, not just to Microsoft and its customers, but to governments worldwide. How do they do it? Here are five key things to understand.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg)\">1. We follow actors, but not the red-carpet kind.<\/h2><p class=\"wp-block-paragraph\">For MTAC, the word &ldquo;actor&rdquo; does not refer to an individual. It&rsquo;s a term used to characterize a collection of threats that indicate a coordinated network, which ultimately points to a cyber influence operation. MTAC analysts identify an actor when they see a set of activities that use the same techniques and the same infrastructure&mdash;which could be social media accounts, websites, or blogs&mdash;to put out a consistent message to a specific target audience.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg)\">2. We analyze impact, not output.<\/h2><p class=\"wp-block-paragraph\">People often think about cyber influence threats in terms of fake accounts and manipulative pieces of content. MTAC analysts are less concerned with individual outputs than they are with finding the most impactful activity, which is defined by three things:<\/p><ul class=\"wp-block-list\"><li class=\"wp-block-list-item\"><strong>Scale<\/strong>&nbsp;is the reach of the content: the number of clicks; how many people see it. Scale is important, but only if there are stakes involved.<\/li>\n\n\n<li class=\"wp-block-list-item\"><strong>Stakes<\/strong>&nbsp;are there when a politically sensitive topic is released at a politically sensitive time and, crucially, fed to a target audience that&rsquo;s reliant on that information.<\/li>\n\n\n<li class=\"wp-block-list-item\"><strong>Stickiness<\/strong>&nbsp;is about how long content persists in the world. How often does it jump from platform to platform? How often does it get reworked and reshared?<\/li>\n<\/ul><p class=\"wp-block-paragraph\">By this definition of impact, MTAC estimates that only about 5% of actors are responsible for 95% of the impact.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg)\">3. We look for the known knowns.<\/h2><p class=\"wp-block-paragraph\">The best way to identify a new threat is to pay attention to what you already know. It&rsquo;s the exception rather than the rule for MTAC analysts to encounter an actor they haven&rsquo;t seen before. After all, these are people trying to get a job done. If they&rsquo;re successful, they stick with what works. Analysts often see a threat and have a very good idea of who might be behind it, because the actor has a distinct set of tactics that they repeat again and again. During the 2024 US election, MTAC analysts were able to look at a piece of content and, based on the known knowns, be quite sure who was responsible in a matter of minutes.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg)\">4. We speak their language.<\/h2><p class=\"wp-block-paragraph\">MTAC analysts come from diverse backgrounds&mdash;academia, journalism, think tanks, government. But the one thing they all have in common is that they speak at least one language other than English. That&rsquo;s crucial: To find an adversary, analysts need to work in their language, and understand context and nuance. The MTAC team collectively speaks at least 16 languages, covering most of Europe, all of Latin America, a good portion of Africa, the Asia-Pacific, and nearly the entire Middle East.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg)\">5. We watch for outsourcing.<\/h2><p class=\"wp-block-paragraph\">Many nation-state actors are actually private-sector businesses. Running an influence operation requires skills that governments don&rsquo;t have, like audience analysis and online marketing. Many of the most persistent actors MTAC tracks are private companies working on behalf of governments, and they&rsquo;re often better at the job than past actors who have been &ldquo;in house.&rdquo;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Breaking down the key concepts and tactics behind the Microsoft Threat Analysis Center&rsquo;s (MTAC) work to detect cyber influence operations worldwide.<\/p>\n","protected":false},"author":23,"featured_media":2439,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_microsoft_sidebar_content":"<!-- wp:group {\"metadata\":{\"name\":\"Social Share\"},\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|sm\"}},\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"05xlfuiuy\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-05xlfuiuy\" data-microsoft-breakpoint-id=\"05xlfuiuy\"><!-- wp:paragraph {\"style\":{\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"6px\"}},\"fontSize\":\"body-sm\"} -->\n<p class=\"has-body-sm-font-size\" style=\"font-style:normal;font-weight:600;letter-spacing:6px;text-transform:uppercase\">Share<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:microsoft-social-share\/social-share {\"show_facebook\":false,\"order_share\":2,\"order_facebook\":3,\"order_x\":1,\"order_linkedin\":0,\"backgroundColor\":\"#291817\",\"globalUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\",\"xUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"microsoftBreakpointId\":\"8vxt56kk0\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-text has-hover-link microsoft-breakpoint-id-8vxt56kk0\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-microsoft-breakpoint-id=\"8vxt56kk0\"><!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/www.youtube.com\/watch?v=a2dgNkdHo-k\" target=\"_blank\" rel=\"noreferrer noopener\">Inside the high-security facility tackling digital threats<\/a><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/www.youtube.com\/watch?v=a2dgNkdHo-k\" target=\"_blank\" rel=\"noreferrer noopener\">Watch the BBC News feature on MTAC <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->","_microsoft_bottom_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|xl-fluid\"}},\"layout\":{\"type\":\"grid\",\"minimumColumnWidth\":\"19rem\"},\"microsoftBreakpointId\":\"vg97ktoc2\"} -->\n<div class=\"wp-block-group alignwide microsoft-breakpoint-id-vg97ktoc2\" data-microsoft-breakpoint-id=\"vg97ktoc2\"><!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableUrl\":\"a\",\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"teyd5ircy\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-teyd5ircy\" data-is-clickable=\"true\" data-clickable-url=\"a\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"teyd5ircy\"><!-- wp:group {\"isClickable\":true,\"layout\":{\"type\":\"default\"},\"clickableContext\":\"selector\",\"microsoftBreakpointId\":\"1myrernya\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-1myrernya\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"1myrernya\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2440,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/emerging-threats\/US-healthcare-at-risk-strengthening-resiliency-against-ransomware-attacks\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/752x580_MSFT_Security_Insider_Healthcare_Ransomware_Report.avif\" alt=\"Story: Strengthening resiliency against ransomware attacks\" class=\"wp-image-2440\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/emerging-threats\/US-healthcare-at-risk-strengthening-resiliency-against-ransomware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">US healthcare at risk: Strengthening resiliency against ransomware attacks<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/emerging-threats\/US-healthcare-at-risk-strengthening-resiliency-against-ransomware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">\n    <span class=\"screen-reader-text\">\n      Read \u201c5 things threat analysts wish you knew\u201d\n    <\/span>\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableUrl\":\"a\",\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"xtxheld0n\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-xtxheld0n\" data-is-clickable=\"true\" data-clickable-url=\"a\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"xtxheld0n\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2441,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/10\/cyber-signals-issue-8-education-under-siege-how-cybercriminals-target-our-schools\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/MSFT_CyberSignals_8thEdition_Feature-Image.webp\" alt=\"Story: How cybercriminals target our schools\u200b\u200b\" class=\"wp-image-2441\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/10\/cyber-signals-issue-8-education-under-siege-how-cybercriminals-target-our-schools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Education under siege: How cybercriminals target our schools<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/10\/cyber-signals-issue-8-education-under-siege-how-cybercriminals-target-our-schools\/\" target=\"_blank\" rel=\"noreferrer noopener\">\n    \n    <span class=\"screen-reader-text\">\n      Read \u201cProtecting NGOs from cyberattacks\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"798ggeupb\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-798ggeupb\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"798ggeupb\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2442,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"large\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/aka.ms\/mddrpdf\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Article-3-Microsoft-Digital-Defense-Report-2024-1-1_FULLSIZE-768x432-1-scaled-1-1024x672.jpg\" alt=\"Report: Microsoft Digital Defense Report\" class=\"wp-image-2442\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/aka.ms\/mddrpdf\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Digital Defense Report 2024<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/aka.ms\/mddrpdf\" target=\"_blank\" rel=\"noreferrer noopener\">\n\n    <span class=\"screen-reader-text\">\n      Read \u201cStarting your journey to become quantum-safe\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group --><\/div>\n<!-- \/wp:group -->","_microsoft_story_hero_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"0\"},\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"0.15em\",\"lineHeight\":\"1\"}},\"fontSize\":\"body-xs\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"zmxsh4o4w\"} -->\n<div class=\"wp-block-group alignwide has-body-xs-font-size microsoft-breakpoint-id-zmxsh4o4w\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"zmxsh4o4w\"><!-- wp:tenup\/post-primary-term {\"isLink\":false,\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|xs\",\"bottom\":\"var:preset|spacing|xs\",\"left\":\"var:preset|spacing|xs\",\"right\":\"var:preset|spacing|xs\"}},\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|clear-blue\"}}}},\"backgroundColor\":\"brown-black\",\"textColor\":\"clear-blue\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"align\":\"wide\",\"className\":\"is-style-post-header\",\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|2-xl-fluid\"}},\"layout\":{\"type\":\"flex\",\"flexWrap\":\"wrap\",\"justifyContent\":\"space-between\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"3xxgrttak\"} -->\n<div class=\"wp-block-group alignwide is-style-post-header microsoft-breakpoint-id-3xxgrttak\" data-microsoft-breakpoint-id=\"3xxgrttak\"><!-- wp:group {\"style\":{\"layout\":{\"selfStretch\":\"fixed\",\"flexSize\":\"\"}},\"layout\":{\"type\":\"default\"},\"microsoftBreakpointId\":\"kgbedb7qx\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-kgbedb7qx\" data-microsoft-breakpoint-id=\"kgbedb7qx\"><!-- wp:post-title {\"level\":1,\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-4-xl-fluid\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:post-excerpt {\"style\":{\"layout\":{\"selfStretch\":\"fit\",\"flexSize\":\"\"}}} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_prefix_content":"<!-- wp:group {\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"right\",\"orientation\":\"horizontal\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"78xaub60h\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-78xaub60h\" data-microsoft-breakpoint-id=\"78xaub60h\"><!-- wp:post-date {\"format\":\"M j, Y\"} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_suffix_content":"<!-- wp:paragraph {\"placeholder\":\"Add content to this area...\"} -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_microsoft_author-bio_content":"","_microsoft_responsive_featured_images":[],"_microsoft_use_source_image":false,"_microsoft_color_scheme":"clear-blue","footnotes":""},"categories":[13,5],"tags":[],"topic":[48],"class_list":["post-2438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-policy-experts","topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 things you need to know about tracking today\u2019s nation-state threats | Microsoft<\/title>\n<meta name=\"description\" content=\"The key concepts and tactics behind the Microsoft Threat Analysis Center\u2019s (MTAC) work to detect cyber influence operations worldwide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 things you need to know about tracking today\u2019s nation-state threats | Microsoft\" \/>\n<meta property=\"og:description\" content=\"The key concepts and tactics behind the Microsoft Threat Analysis Center\u2019s (MTAC) work to detect cyber influence operations worldwide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Corporate Responsibility\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-28T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-28T22:48:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CELA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CELA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\"},\"author\":{\"name\":\"CELA\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\"},\"headline\":\"5 things you need to know about tracking today\u2019s nation-state threats\",\"datePublished\":\"2025-08-28T17:00:00+00:00\",\"dateModified\":\"2026-01-28T22:48:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg\",\"articleSection\":[\"Cybersecurity\",\"Policy Experts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\",\"name\":\"5 things you need to know about tracking today\u2019s nation-state threats | Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg\",\"datePublished\":\"2025-08-28T17:00:00+00:00\",\"dateModified\":\"2026-01-28T22:48:14+00:00\",\"description\":\"The key concepts and tactics behind the Microsoft Threat Analysis Center\u2019s (MTAC) work to detect cyber influence operations worldwide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg\",\"contentUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg\",\"width\":1920,\"height\":900,\"caption\":\"Illustration of government buildings and digital data graphics.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 things you need to know about tracking today\u2019s nation-state threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"name\":\"Corporate Responsibility\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\",\"name\":\"Corporate Responsibility\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corporate Responsibility\"},\"image\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\",\"name\":\"CELA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"caption\":\"CELA\"},\"sameAs\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 things you need to know about tracking today\u2019s nation-state threats | Microsoft","description":"The key concepts and tactics behind the Microsoft Threat Analysis Center\u2019s (MTAC) work to detect cyber influence operations worldwide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/","og_locale":"en_US","og_type":"article","og_title":"5 things you need to know about tracking today\u2019s nation-state threats | Microsoft","og_description":"The key concepts and tactics behind the Microsoft Threat Analysis Center\u2019s (MTAC) work to detect cyber influence operations worldwide.","og_url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/","og_site_name":"Microsoft Corporate Responsibility","article_published_time":"2025-08-28T17:00:00+00:00","article_modified_time":"2026-01-28T22:48:14+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg","type":"image\/jpeg"}],"author":"CELA","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CELA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#article","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/"},"author":{"name":"CELA","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0"},"headline":"5 things you need to know about tracking today\u2019s nation-state threats","datePublished":"2025-08-28T17:00:00+00:00","dateModified":"2026-01-28T22:48:14+00:00","mainEntityOfPage":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/"},"wordCount":589,"publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg","articleSection":["Cybersecurity","Policy Experts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/","url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/","name":"5 things you need to know about tracking today\u2019s nation-state threats | Microsoft","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg","datePublished":"2025-08-28T17:00:00+00:00","dateModified":"2026-01-28T22:48:14+00:00","description":"The key concepts and tactics behind the Microsoft Threat Analysis Center\u2019s (MTAC) work to detect cyber influence operations worldwide.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#primaryimage","url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg","contentUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CELA_MTAC5Things_heroart-e1765307489638.jpg","width":1920,"height":900,"caption":"Illustration of government buildings and digital data graphics."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/celacampaig.wpenginepowered.com\/"},{"@type":"ListItem","position":2,"name":"5 things you need to know about tracking today\u2019s nation-state threats"}]},{"@type":"WebSite","@id":"https:\/\/celacampaig.wpenginepowered.com\/#website","url":"https:\/\/celacampaig.wpenginepowered.com\/","name":"Corporate Responsibility","description":"","publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization","name":"Corporate Responsibility","url":"https:\/\/celacampaig.wpenginepowered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corporate Responsibility"},"image":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0","name":"CELA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","caption":"CELA"},"sameAs":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/"]}]}},"_links":{"self":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/comments?post=2438"}],"version-history":[{"count":0,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media\/2439"}],"wp:attachment":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media?parent=2438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/categories?post=2438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/tags?post=2438"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/topic?post=2438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}