This is the Trace Id: 7f27129de985ef9127183767a322a758
Skip to main content Microsoft Defender Microsoft Entra Microsoft Intune Microsoft Purview Microsoft Security Copilot Microsoft Sentinel View all products AI-powered cybersecurity Cloud security Data security & governance Identity & network access Privacy & risk management Security for AI Small & medium business Unified SecOps Zero Trust Pricing Services Partners Why Microsoft Security Cybersecurity awareness Customer stories Security 101 Product trials Industry recognition Microsoft Security Insider Microsoft Digital Defense Report Security Response Center Microsoft Security Blog Microsoft Security Events Microsoft Tech Community Documentation Technical Content Library Training & certifications Compliance Program for Microsoft Cloud Microsoft Trust Center Service Trust Portal Microsoft Secure Future Initiative Business Solutions Hub Contact Sales Start free trial Microsoft Security Azure Dynamics 365 Microsoft 365 Microsoft Teams Windows 365 Microsoft AI Azure Space Mixed reality Microsoft HoloLens Microsoft Viva Quantum computing Sustainability Education Automotive Financial services Government Healthcare Manufacturing Retail Find a partner Become a partner Partner Network Microsoft Marketplace Software companies Blog Microsoft Advertising Developer Center Documentation Events Licensing Microsoft Learn Microsoft Research View Sitemap

Cyber Influence Operations

Learn how foreign influence operations utilize new methods and technologies to erode trust, increase polarization, and threaten democratic processes.

Trends in cyber influence operations

Operations are becoming increasingly sophisticated as technology evolves. We are seeing tools used in traditional cyberattacks being applied to cyber influence operations alongside increased coordination and amplification among nation states. Foreign cyber influence operations typically have three stages: pre-position, launch and amplification.

A diagram showing progression of foreign cyber influence operations

Illustration of how narratives about US biolabs and biological weapons spread via the three broad phases of many foreign influence operations—pre-position, launch, and amplification.1

Spotlight

Influence operations: COVID-19 and Russia’s invasion of Ukraine

Learn about cyber influence operations used in nation state campaigns throughout the COVID-19 pandemic to undermine democratic institutions, and in Russia’s invasion of Ukraine to maximize impact.

75% of people worry information is being weaponized.

Tracking the Russian Propaganda Index

In January 2022, nearly 1,000 US websites were referring traffic to Russian propaganda websites. The most common topics were the war in Ukraine, US domestic politics, and COVID-19 vaccines.
A diagram of a chart showing the Russian propaganda index in the United States over 2 years

The Russian Propaganda Index (RPI) monitors the flow of news from Russian state-controlled and sponsored news outlets and amplifiers as a proportion of overall news traffic on the internet. The RPI can be used to chart the consumption of Russian propaganda across the internet and in different geographies on a precise timeline.

Synthetic media

Two key trends are the proliferation of easy-to-use tools for artificially creating highly realistic images and videos, and quick dissemination of content optimized for specific audiences. 

Microsoft’s holistic approach

Microsoft has increased technical capacity to detect and disrupt foreign influence operations and is committed to transparently reporting on these operations like our reporting on cyberattacks.

Explore other critical focus areas

The State of Cybercrime

Cybercrime continues to rise, driven by increases in both random and targeted attacks. Attack methods have evolved to create increasingly diverse threats.

Nation State Threats

Nation state actors are launching increasingly sophisticated cyberattacks to evade detection and further their strategic priorities.

Devices and Infrastructure

As organizations harness advances in computing capability and entities digitize to thrive, the attack surface of the digital world is exponentially increasing.

Cyber Resilience

As threats in the cyber landscape increase, building cyber resilience into the fabric of the organization is as crucial as financial and operational resilience.

Read this chapter and connect with us

[1] Russian Foreign Ministry Spokeswoman Maria Zakharova: https://tass.com/politics/1401777; Lavrov photo credit: Kirill Kudryavtsev/Pool/AFP/Getty Images - https://www.cnn.com/2022/05/05/opinions/sergey-lavrov-hitler-comments-ukraine-kauders/index.html

Follow Microsoft