Microsoft Sees Sharp Rise in Russian Cyber Activity Aimed at NATO Members

20 October 2025

A recent Microsoft assessment suggests that Russian cyber operations against NATO countries have intensified over the past year, marking a notable increase in the scope and frequency of digital intrusions linked to state-sponsored actors.

The company observed that, compared with the previous year, Russian cyber activity directed at NATO nations has risen by roughly a quarter. While Ukraine continues to face the majority of Russia’s digital offensives, the analysis indicates that the most affected countries beyond Ukraine are all members of the Alliance.

Independent reporting on Microsoft’s findings points to the United States, the United Kingdom, and Germany among the most frequently targeted states, with smaller shares attributed to Belgium, Italy, Estonia, France, the Netherlands, and Poland. Although Microsoft’s public summary does not provide a precise breakdown by nation, it confirms that Russia’s attention has expanded well beyond its initial focus on Ukraine.

The list of countries reflects a pattern consistent with Moscow’s broader strategic interests.

The United States remains a central target due to its leadership role in NATO and its provision of intelligence and military aid to Ukraine. The United Kingdom, which maintains one of Europe’s most active intelligence networks and strong support for Kyiv, faces sustained cyber pressure on its government and financial systems. Germany, Europe’s industrial and economic powerhouse, has become a priority for operations aimed at energy infrastructure and technological industries.

Meanwhile, nations such as France, Italy, Belgium, and the Netherlands host key EU and NATO institutions, making them valuable for intelligence gathering on policymaking and defence coordination. Poland and Estonia, situated on NATO’s eastern flank, are considered symbolic and logistical frontlines — hubs for Western military assistance to Ukraine and frequent testbeds for Russian hybrid tactics.

The research shows that public institutions remain the primary focus of these intrusions. Roughly a quarter of identified Russian activity was directed at government networks, while research bodies and policy organisations were also frequent targets. According to Microsoft, the intent appears largely intelligence-related — gathering insight into political, military, and technological developments across the NATO region.

Analysts at the company have also noted a gradual shift toward less-defended entities. Smaller firms operating in countries that support Ukraine have increasingly been singled out as entry points through which hackers might access larger corporate or institutional systems.

The findings come amid heightened tension between Moscow and the European Union. Earlier this month, European Commission President Ursula von der Leyen accused Russia of waging a coordinated campaign designed to destabilise European societies and test the Union’s response. Her remarks followed several airspace violations involving drones and military aircraft over EU territory.

Microsoft’s assessment highlights how the digital dimension of the conflict continues to evolve, with cyberattacks now forming part of a broader strategy to influence, disrupt, and extract information from Western allies. The company warns that the expansion of Russian targeting requires sustained investment in cyber resilience, particularly among smaller organisations that often lack the resources to defend themselves against sophisticated state-backed threats.

front page info
LATEST NEWS