{"id":102834,"date":"2021-12-15T09:00:00","date_gmt":"2021-12-15T17:00:00","guid":{"rendered":""},"modified":"2025-06-20T08:57:59","modified_gmt":"2025-06-20T15:57:59","slug":"a-report-on-nobeliums-unprecedented-nation-state-attack","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/","title":{"rendered":"A report on NOBELIUM\u2019s unprecedented nation-state attack"},"content":{"rendered":"\n<p class=\"has-text-align-left wp-block-paragraph\"><em>This is the final post in a four-part series on the NOBELIUM nation-state cyberattack.<\/em>&nbsp;<em>In December 2020, Microsoft began sharing details with the world about what became known as the most sophisticated nation-state cyberattack in history. Microsoft\u2019s&nbsp;<\/em><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/nation-state-attacks#office-ContentAreaHeadingTemplate-hkzu7ix\" rel=\"noreferrer noopener\"><em>four-part video series<\/em><\/a><em>&nbsp;\u201cDecoding NOBELIUM\u201d pulls the curtain back on the NOBELIUM incident and how world-class threat hunters from Microsoft and around the industry came together to take on the most sophisticated nation-state attack in history. In this last post, we\u2019ll<\/em>&nbsp;<em>reflect on lessons learned as covered in the&nbsp;<\/em><a target=\"_blank\" href=\"https:\/\/youtu.be\/wFtGD7p58cQ\" rel=\"noreferrer noopener\"><em>fourth episode<\/em><\/a><em>&nbsp;of the docuseries.&nbsp;<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left wp-block-paragraph\">Nation-state attacks are a serious and growing threat that organizations of all sizes face. Their primary objective is to gain strategic advantage for their country, such as by stealing secrets, gathering cyber intelligence, conducting reconnaissance, or disrupting operations. These efforts are typically conducted by state-sponsored actors with significant expertise and funding, making them a particularly challenging adversary to defend against.<\/p>\n\n\n\n<p class=\"has-text-align-left wp-block-paragraph\">NOBELIUM, a Russian-linked group, is perhaps best known for the widespread SolarWinds supply chain breach. The incident was part of an even larger and more advanced campaign that had been quietly underway for more than a year. As details of this attack were uncovered, it became clear that it was the most sophisticated nation-state cyberattack in history.<\/p>\n\n\n\n<p class=\"has-text-align-left wp-block-paragraph\">In the&nbsp;<a target=\"_blank\" href=\"https:\/\/youtu.be\/wFtGD7p58cQ\" rel=\"noreferrer noopener\">final episode<\/a>&nbsp;of our \u201cDecoding NOBELIUM\u201d series, we provide an after-action report that explores Microsoft\u2019s findings and discusses lessons learned.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"nobelium-deployed-extensive-tactics\">NOBELIUM deployed extensive tactics<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Let\u2019s start by reviewing the key stages of the attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"the-intrusion\">The intrusion<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">It\u2019s critical to understand how NOBELIUM achieved penetration into environments. Going beyond the supply chain compromise, this actor also deployed many common-place tactics like password spraying or exploiting the vulnerabilities of unpatched devices to steal credentials and gain access to systems. Ultimately, NOBELIUM leveraged a wide range of techniques to achieve penetration and adapted their toolset to each victim\u2019s unique environment in order to achieve their goals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"the-exploitation\">The<strong> <\/strong>exploitation<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Once NOBELIUM had gained entry, they followed the typical pattern for internal reconnaissance: discover the elevated accounts, find out which machines were there, and create a sophisticated map to understand how to reach their targets. They demonstrated extensive knowledge of enterprise environments and cybersecurity systems by evading defenses, masking activities in regular system processes, and hiding malware under many layers of code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"the-exfiltration\">The exfiltration<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Armed with an understanding of their target\u2019s environment, NOBELIUM executed their plan\u2014gaining access to their source codes, harvesting emails, or stealing production secrets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"nobelium-demonstrated-patience-and-stealth\">NOBELIUM demonstrated patience and stealth<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The NOBELIUM group moved methodically to avoid getting caught. \u201cThey were so deliberate and careful about what they did. It wasn\u2019t like a smash and grab, where they came in and just vacuumed up everything and fled,\u201d said Security Analyst Joanne of the Microsoft Digital Security and Resilience (DSR) Security Operations Center (SOC) Hunt Team.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It took time to move undetected through networks, gathering information and gaining access to privileged networks. For example, they disabled organizations&#8217; endpoint detection and response (EDR) solutions from being launched upon system startups. NOBELIUM then waited up to a month for computers to be rebooted on a patch day and took advantage of vulnerable machines that hadn\u2019t been patched.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThe adversary showed discipline in siloing all of the technical indicators that would give up their presence,\u201d said John Lambert, General Manager of the Microsoft Threat Intelligence Center. \u201cMalware was named different things. It was compiled in different ways. The command and control domains they would use differed per victim. As they moved laterally within a network from machine to machine, NOBELIUM took great pains to clean up after each step.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"preparing-for-future-nation-state-attacks\">Preparing for future nation-state attacks<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">When adversaries take this much care in hiding their activities, it can take the detection of many seemingly benign activities across different vectors pulled together to highlight one overall technique.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cIn order to respond to an attack like NOBELIUM, with its scope and breadth and sophistication, you need to have visibility into various entities across your entire digital state,\u201d explains Sarah Fender, Partner Group Program Manager for <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/#overview\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>. \u201cYou need to have visibility into security data and events relating to users and endpoints, infrastructure, on-premises and in the cloud, and the ability to quickly analyze that data.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">NOBELIUM leveraged users and credentials as a critical vector for intrusion and escalation. Identity-based attacks are on the rise. \u201cOnce I can authenticate into your environment, I don&#8217;t need malware anymore, so that means monitoring behaviors,\u201d says Roberto, Principal Consultant and Lead Investigator for Microsoft\u2019s Detection and Response Team. \u201cBuilding a profile for when Roberto&#8217;s using his machine, he accesses these 25 resources, and he does these kinds of things and he&#8217;s never been in these four countries. If I ever see something that doesn&#8217;t fit that pattern, I need to alert on it.\u201d&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Bottom line: ensure you are protecting your identities.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, if we\u2019ve learned anything, it\u2019s that we need to take care of our security teams, especially during a cybersecurity incident.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cDefender fatigue is a real thing,\u201d says Lambert. \u201cYou have to be able to invest in those defenders so that they can surge when they need to. Security, like other professions, is not just a job, it&#8217;s also a calling. But it also leads to fatigue and exhaustion if the incident drumbeat is too strong. You have to have reserves and plan for that so that you can support your defenders and rest them in between incidents.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As we prepare for future attacks, it comes down to joining forces.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8220;When I think about what this incident means going forward, it certainly reinforces the need for the world to work together on these threats,\u201d explains Lambert. \u201cNo one company sees it all and it is very important, especially with sophisticated threats, to be able to work very quickly with lines of trust established. This is not just about companies working together, it&#8217;s also about individuals trusting each other, impacted companies, fellow security industry companies, and government institutions.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-can-you-protect-your-organization-and-defenders\">How can you protect your organization and defenders?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Learn more in the <a href=\"https:\/\/youtu.be\/wFtGD7p58cQ\" target=\"_blank\" rel=\"noreferrer noopener\">final episode<\/a> of our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/nation-state-attacks#office-ContentAreaHeadingTemplate-hkzu7ix\" target=\"_blank\" rel=\"noreferrer noopener\">four-part video series<\/a> \u201cDecoding NOBELIUM,\u201d where security professionals give insights from the after-action report on NOBELIUM. Thanks for joining us for this series and check out the other posts in the series:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/28\/how-nation-state-attackers-like-nobelium-are-changing-cybersecurity\/\" rel=\"noreferrer noopener\">How nation-state attackers like NOBELIUM are changing cybersecurity<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/11\/10\/the-hunt-for-nobelium-the-most-sophisticated-nation-state-attack-in-history\/\" rel=\"noreferrer noopener\">The hunt for NOBELIUM, the most sophisticated nation-state attack in history<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/02\/behind-the-unprecedented-effort-to-protect-customers-against-the-nobelium-nation-state-attack\/\" rel=\"noreferrer noopener\">Behind the unprecedented effort to protect customers against the NOBELIUM nation-state attack<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft is committed to helping organizations stay protected from cyberattacks, whether cybercriminal or nation-state. Consistent with our mission to provide security for all, Microsoft will use our leading threat intelligence and a global team of dedicated cybersecurity defenders to partner across the security industry and help protect our customers and the world. Just some recent examples of Microsoft\u2019s efforts to combat nation-state attacks include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">The investigation of&nbsp;<a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/25\/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks\/\" rel=\"noreferrer noopener\">ongoing targeted activity<\/a>&nbsp;by NOBELIUM against privileged accounts of service providers to gain access to downstream customers.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The September 2021 discovery and investigation of a&nbsp;<a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/27\/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor\/\" rel=\"noreferrer noopener\">NOBELIUM malware referred to as FoggyWeb<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The May 2021 profiling of NOBELIUM\u2019s early-stage toolset of&nbsp;<a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/28\/breaking-down-nobeliums-latest-early-stage-toolset\/\" rel=\"noreferrer noopener\">EnvyScout, BoomBox, NativeZone, and VaporRage<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Issuing more than 1,600 notifications to more than 40 IT companies alerting them to <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/11\/18\/iranian-targeting-of-it-sector-on-the-rise\/\" target=\"_blank\" rel=\"noreferrer noopener\">targeting by several Iranian threat groups<\/a> (from May through October, those threats were 10 to 13 percent of the total notifications).<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The seizure of websites <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/06\/nickel-targeting-government-organizations-across-latin-america-and-europe\/\" target=\"_blank\" rel=\"noreferrer noopener\">operated by&nbsp;NICKEL<\/a>, a China-based threat actor, and the disruption of ongoing attacks targeting organizations in 29 countries.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The investigation of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/11\/iran-linked-dev-0343-targeting-defense-gis-and-maritime-sectors\/\" target=\"_blank\" rel=\"noreferrer noopener\">Iran-linked&nbsp;DEV-0343<\/a>,&nbsp;conducting password spraying focused on United States and Israeli defense technology companies, Persian Gulf ports of entry, and global maritime transportation companies with a business presence in the Middle East.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">For immediate support, visit the&nbsp;<a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/msrc\" rel=\"noreferrer noopener\">Microsoft Security Response Center<\/a> (MSRC) where you can report an issue and get guidance from the latest security reports and Microsoft Security Response Center blog posts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions,&nbsp;<a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" rel=\"noreferrer noopener\">visit our website<\/a>. Bookmark the&nbsp;<a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a target=\"_blank\" href=\"https:\/\/twitter.com\/@MSFTSecurity\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the final post of a four-part series on the NOBELIUM nation-state attack, we explore key findings from the after-action report on the attack.<\/p>\n","protected":false},"author":104,"featured_media":102930,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3828],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3726],"topic":[3665,3674,3685],"coauthors":[1935],"class_list":["post-102834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-midnight-blizzard-nobelium","content-type-news","product-microsoft-sentinel","topic-analyst-reports","topic-incident-response","topic-siem-and-xdr","review-flag-1-1694638265-354","review-flag-disabled","review-flag-never-1694638263-791","review-flag-partn-1694638263-177","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A report on NOBELIUM\u2019s unprecedented nation-state attack | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A report on NOBELIUM\u2019s unprecedented nation-state attack | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"In the final post of a four-part series on the NOBELIUM nation-state attack, we explore key findings from the after-action report on the attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-15T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T15:57:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob Lefferts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Lefferts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rob-lefferts\/\",\"@type\":\"Person\",\"@name\":\"Rob Lefferts\"}],\"headline\":\"A report on NOBELIUM\u2019s unprecedented nation-state attack\",\"datePublished\":\"2021-12-15T17:00:00+00:00\",\"dateModified\":\"2025-06-20T15:57:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/\"},\"wordCount\":1380,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg\",\"keywords\":[\"Midnight Blizzard (NOBELIUM)\"],\"articleSection\":[\"Cybersecurity\",\"Incident response\",\"Threat protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/\",\"name\":\"A report on NOBELIUM\u2019s unprecedented nation-state attack | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg\",\"datePublished\":\"2021-12-15T17:00:00+00:00\",\"dateModified\":\"2025-06-20T15:57:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Female developer speaking in front of a white board during team stand up meeting.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A report on NOBELIUM\u2019s unprecedented nation-state attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/618eee50225bd8f386c91e96152888ff\",\"name\":\"Alex Dreiling-Flynn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/bcd0d00afdded77be15365b7979cebf1af13fa56bfdca73ca5f18b0667fc540f?s=96&d=microsoft&r=g9e52325c48374a324755a0a0d1d2973d\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bcd0d00afdded77be15365b7979cebf1af13fa56bfdca73ca5f18b0667fc540f?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bcd0d00afdded77be15365b7979cebf1af13fa56bfdca73ca5f18b0667fc540f?s=96&d=microsoft&r=g\",\"caption\":\"Alex Dreiling-Flynn\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alexandradreilingflynn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A report on NOBELIUM\u2019s unprecedented nation-state attack | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/","og_locale":"en_US","og_type":"article","og_title":"A report on NOBELIUM\u2019s unprecedented nation-state attack | Microsoft Security Blog","og_description":"In the final post of a four-part series on the NOBELIUM nation-state attack, we explore key findings from the after-action report on the attack.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-12-15T17:00:00+00:00","article_modified_time":"2025-06-20T15:57:59+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg","type":"image\/jpeg"}],"author":"Rob Lefferts","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg","twitter_misc":{"Written by":"Rob Lefferts","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rob-lefferts\/","@type":"Person","@name":"Rob Lefferts"}],"headline":"A report on NOBELIUM\u2019s unprecedented nation-state attack","datePublished":"2021-12-15T17:00:00+00:00","dateModified":"2025-06-20T15:57:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/"},"wordCount":1380,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg","keywords":["Midnight Blizzard (NOBELIUM)"],"articleSection":["Cybersecurity","Incident response","Threat protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/","name":"A report on NOBELIUM\u2019s unprecedented nation-state attack | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg","datePublished":"2021-12-15T17:00:00+00:00","dateModified":"2025-06-20T15:57:59+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/12\/CLO20b_Sasha_team_meeting_002.jpg","width":1200,"height":800,"caption":"Female developer speaking in front of a white board during team stand up meeting."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/15\/a-report-on-nobeliums-unprecedented-nation-state-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"A report on NOBELIUM\u2019s unprecedented nation-state attack"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/618eee50225bd8f386c91e96152888ff","name":"Alex Dreiling-Flynn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bcd0d00afdded77be15365b7979cebf1af13fa56bfdca73ca5f18b0667fc540f?s=96&d=microsoft&r=g9e52325c48374a324755a0a0d1d2973d","url":"https:\/\/secure.gravatar.com\/avatar\/bcd0d00afdded77be15365b7979cebf1af13fa56bfdca73ca5f18b0667fc540f?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bcd0d00afdded77be15365b7979cebf1af13fa56bfdca73ca5f18b0667fc540f?s=96&d=microsoft&r=g","caption":"Alex Dreiling-Flynn"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alexandradreilingflynn\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/102834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/104"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=102834"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/102834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/102930"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=102834"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=102834"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=102834"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=102834"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=102834"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=102834"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=102834"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=102834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}