CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Apr 27, 2026

Microsoft Digital Defense Report 2025 - Microsoft

Microsoft Archived Apr 27, 2026 ✓ Full text saved

Microsoft Digital Defense Report 2025 Microsoft

Full text archived locally
✦ AI Summary · Claude Sonnet


    Microsoft Digital Defense Report 2025 This year’s Microsoft Digital Defense Report (MDDR) showcases the scale and sophistication of today’s cyber threats, the impact of emerging technologies on those threats, and the strategies that leaders, governments, and defenders can use to defend against them. Read the full report Read the government executive summary SHARE Our unique vantage point Microsoft’s global presence—spanning billions of users, millions of organizations, and a vast network of partners—provides us with an unparalleled perspective on the cybersecurity threat landscape. 100 trillion 100 trillion security signals processed daily 4.5 million 4.5 million net new malware file blocks every day 38 million 38 million identity risk detections analyzed in an average day 15,000+ 15,000 partners in our security ecosystem, making it one of the largest in the world 34,000 34,000 full-time equivalent security engineers employed worldwide 5 billion 5 billion emails screened daily on average to protect users from malware and phishing Top recommendations from MDDR 2025 Based on the insights in our 2025 report, we share expert recommendations to help organizations and governments proactively address today’s evolving cyber risks. Now is the time to take action. Invest in people, not just tools Build in resilience Understand risks and benefits of AI Transition to quantum safety Defend your perimeter Collaborate across sectors Cyber threats: Worldwide customer impact Most cyberattacks in 2025 were concentrated in particular countries. The United States (US), the United Kingdom (UK), Israel, and Germany were the leading targets of cyberattacks. Explore this interactive map to see how the most impacted countries compare to others in their region when it comes to cyber threats. Source: Microsoft Threat Intelligence This map pulls from data on how frequently customers are targeted by malicious activity in each country. The most impacted countries are compared to other countries in their region, both as a percentage of regional activity and a rank of regional activity. Microsoft Digital Defense Report Overview Threat landscape Cybercrime Cybercrime economy Artificial Intelligence AI: Threat and tool Nation-state Nation-state threat actors Additional report topics Read the full report LinkedIn Instagram X MDDR 2025 REPORT OVERVIEW Threat landscape overview Over the past year, threat actors quickly developed new techniques to circumvent cyber defenses, from AI-automated phishing to multi-stage attack chains. At the same time, most threats targeted known security gaps, such as web assets and remote services, with threat actors exploiting these vulnerabilities at a faster pace than ever before. Attacks by sector Most cyberattacks targeted industries with vast amounts of sensitive data, including government agencies and research and academia. Below are the sectors most impacted by cyber threats in 2025. Source: Microsoft Threat Intelligence Source: Microsoft Threat Intelligence Attack motivations Attacks are by and large financially motivated: extortion, ransomware, and data theft are primary attack motivations. Espionage accounts for only 4% of attacks. Below are the most common motivations behind cyberattacks, when identifiable. Source: Microsoft Incident Response Source: Microsoft Incident Response MDDR 2025 REPORT CYBERCRIME Cybercrime economy The cybercrime economy is an increasingly specialized and intricate ecosystem made up of access brokers, ransomware operators, and data extortion groups. As financial incentives increase across the cybercrime-as-a-service (CaaS) model and international borders obscure criminal networks, it can be difficult for governments and organizations to disrupt the cybercrime economy. $10,000 vs $100,000 A security researcher may earn $10,000 for responsibly disclosing a vulnerability to a bug bounty program but may earn over $100,000 by selling the same exploit to a cyber mercenary. 97% 97% of identity attacks were password spray attacks. Even as more sophisticated tactics evolve, most identity attackers exploit the common problem of weak and overused passwords. Lumma Stealer Lumma Stealer was the most prevalent infostealer observed between October 2024 and October 2025. A sophisticated malware-as-a-service (MaaS) platform, Lumma Stealer can retrieve sensitive data from various browsers and applications, such as cryptocurrency wallets. This data is then sold to access brokers through dark web forums and Telegram channels. Ultimately, other cyber criminals like ransomware operators can use the data to access target networks. In mid-2025, Microsoft’s Digital Crimes Unit, working with the U.S. Department of Justice, Europol, and Japan’s Cybercrime Control Center, carried out a landmark disruption operation against Lumma Stealer. Over 2,300 malicious domains were seized or blocked, cutting off Lumma’s infrastructure and redirecting infected devices away from criminal control. Source: Lumma pre-disruption data, Microsoft Digital Crimes Unit Source: Lumma pre-disruption data, Microsoft Digital Crimes Unit Read case study Enable cross-border legal operations Policymakers should promote harmonized cross-border legal frameworks, tools, and tactics to enable faster cybercrime disruptions. MDDR 2025 REPORT AI AI: A tool, threat, and vulnerability Both adversaries and defenders are using AI to make their operations more effective and efficient, rendering the technology a cybersecurity risk and tool at once. AI and defenders AI in threat analysis AI models can scan vast amounts of threat intelligence data to detect early warning signs, helping defenders disrupt attacks before they escalate. AI for identifying gaps AI can compare known threats with existing protections, revealing vulnerabilities and directing security resources. Automated response AI agents can act within seconds of a suspected threat, suspending accounts, initiating password resets, and notifying administrators. AI and adversaries AI as a vulnerability Attackers are compromising improperly secured AI workloads through prompt-based attacks and supply chain exploits, tricking models into executing unauthorized actions. Deepfake fraud Synthetic media–such as voice cloning and deepfake videos–target multinational companies and government organizations, gaining access to sensitive information and costing millions. Automated attacks AI agents could allow threat actors to automate the entire attack lifecycle through chain reconnaissance, vulnerability scanning, and exploitation at scale. Invest in AI research and development Governments should invest in research and development projects that specifically apply AI to cybersecurity technology. Storm-2139: A tale of AI abuse In July 2024, Microsoft uncovered a global network exploiting stolen API keys to bypass AI safety controls and generate abusive AI-generated images. Using content provenance tools and open-source intelligence, the DCU traced the operation and referred the criminals to governments. Read case study MDDR 2025 REPORT NATION-STATE Nation-state threat actors In 2025, nation-state threat actors evolved their cyber and influence operations with more advanced, targeted, and scalable tactics. They rapidly adopted AI to produce automatic and largescale influence campaigns. Nation-state actors remain focused on intelligence collection and public perception manipulation, shaping conflict narratives and flooding the information space with synthetic media to desensitize audiences and exhaust detection systems. Sectors most targeted by nation-state actors: IT, research and academia, government, think tanks, and non-governmental organizations. Observed nation-state activity count per country Certain countries face disproportionate levels of nation-state activity. This is a regional breakdown of countries that receive the most frequent adversary attacks. Source: Microsoft Threat Intelligence nation-state notification data Source: Microsoft Threat Intelligence nation-state notification data Signal red lines and impose diverse consequences for nation-state cyberattacks States should make clear that malicious nation-state cyber activity will result in increasingly severe consequences. These responses can include a range of options, from economic measures and diplomatic sanctions to targeted declassification and public shaming. Detecting North Korean foreign IT workers operating as nation-state actors North Korea places thousands of remote workers at unwitting companies every year to generate revenue and gain access to sensitive intellectual property. Workers are branching into new sectors and job types. Microsoft tracks this remote work activity and provides guidance on how to monitor and remediate this problem. Read case study MDDR 2025 REPORT Additional report topics Take a deeper dive into the 2025 Microsoft Digital Defense Report. Navigate to specific sections of the report below. Introduction Introductory statement by Amy Hogan-Burney and Igor Tsyganskiy About this report Our unique vantage point Top 10 recommendations from this report Part I. The threat landscape Key takeaways How threat actors are shaping the cyber risk environment Identity, access, and the cybercrime economy Human-operated attacks and ransomware Fraud and social engineering Social engineering exploits Cloud threat trends Nation-state adversary threats AI’s double-edge influence: Defending and disrupting the digital landscape Quantum technologies: Strategic priority in a new era of competiton Part II. The defense landscape Key takeaways: Insights and actions for cyber defense AI and advanced defense Countering nation-state and emerging threats Policy, capacity, and future readiness Strategic vision and global commitments Beyond our report Read the executive summary for CISOs Read more about cybersecurity Learn about our cybersecurity programs Discover more Microsoft reports Cybersecurity for customers
    💬 Team Notes
    Article Info
    Source
    Microsoft
    Category
    ◉ Threat Intelligence
    Published
    Apr 27, 2026
    Archived
    Apr 27, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗