![As Tanks Rolled Into Ukraine, So Did Malware. Then Microsoft Entered the War.](https://static01.nyt.com/images/2022/02/28/multimedia/28dc-cyber-train/28dc-cyber-train-facebookJumbo.jpg)
As Tanks Rolled Into Ukraine, So Did Malware. Then Microsoft Entered the War.
The New York Times
After years of talks about the need for public-private partnerships to combat cyberattacks, the war in Ukraine is stress-testing the system.
WASHINGTON — Last Wednesday, a few hours before Russian tanks began rolling into Ukraine, alarms went off inside Microsoft’s Threat Intelligence Center, warning of a never-before-seen piece of “wiper” malware that appeared aimed at the country’s government ministries and financial institutions.
Within three hours, Microsoft threw itself into the middle of a ground war in Europe — from 5,500 miles away. The threat center, north of Seattle, had been on high alert, and it quickly picked apart the malware, named it “FoxBlade” and notified Ukraine’s top cyberdefense authority. Within three hours, Microsoft’s virus detection systems had been updated to block the code, which erases — “wipes” — data on computers in a network.
Then Tom Burt, the senior Microsoft executive who oversees the company’s effort to counter major cyberattacks, contacted Anne Neuberger, the White House’s deputy national security adviser for cyber- and emerging technologies. Ms. Neuberger asked if Microsoft would consider sharing details of the code with the Baltics, Poland and other European nations, out of fear that the malware would spread beyond Ukraine’s borders, crippling the military alliance or hitting West European banks.