Skip to main content
Microsoft Security

Influence operations

Cyber influence operations aim to erode trust, increase polarization, and threaten democratic processes. Tools used in traditional cyberattacks are being applied to cyber influence operations alongside increased coordination and amplification among nation states. Foreign cyber influence operations typically have three stages: pre-position, launch, and amplification.