Redmond sits thousands of miles from physical war zones while simultaneously operating on the front lines of digital conflict.
“Some of our threat intelligence analysts were some of the first observers of the first shots fired in the Russian invasion,” says Steven Masada. “Those shots weren’t bullets. They weren’t cannon fire. They were, in fact, cyber attacks originating from Russia targeting critical infrastructure inside of Ukraine.”
Masada serves as Assistant General Counsel of the Digital Crimes Unit, headquartered on Microsoft’s Eastside campus. During a rare facility tour, Masada demonstrated systems making millions of daily moves to counter cyber attacks originating from China, Russia, Iran, and North Korea.
“The sad reality is that criminals, and in particular, cyber criminals, are some of the most innovative people on planet Earth,” he explained during the DCU visit.
Standing before a large screen displaying the globe with active neutralized threats, Masada noted that most attacks target American systems, accounting for nearly 75% of activity. Attacks primarily aim at government services, IT, research, and academia, motivated by data theft and extortion, according to Microsoft.
A company release indicated that Microsoft, partnering with the Department of Justice, Europol, and Japan’s Cybercrime Control Center, “carried out a landmark disruption operation against Lumma Stealer. Over 2,300 malicious domains were seized or blocked, cutting off Lumma’s infrastructure and redirecting infected devices away from criminal control.”
Masada added the threats include “financially motivated crime, nation state, nation state actors. This is a global phenomenon.”
The issue gained heightened attention following last week’s IT problems involving Amazon and Alaska Airlines. The airline attributed hundreds of flight cancellations to infrastructure failure, not hacking. Amazon Web Services customers reported multiple failures during an unexplained outage.
Masada conducted the tour before both incidents as Microsoft prepared to release a digital defense report claiming 4.5 million malware file blocks occur daily, with five billion emails screened daily for malicious intent. The report recommended that companies hire more personnel, not just technology tools, to combat cyber attacks.
The Digital Crimes Unit’s Redmond location places cybersecurity operations at Microsoft’s corporate headquarters, centralizing threat intelligence analysis, legal coordination, and technical countermeasures under one roof rather than distributing functions across global offices.
Steven Masada’s Assistant General Counsel title indicates the DCU operates at the intersection of legal authority and technical capability, requiring attorneys who understand both criminal law and sophisticated cyber attack methodologies to pursue malicious actors.
The Russia-Ukraine cyber attack observation demonstrates Microsoft’s privileged position monitoring global internet traffic through Windows operating systems, Azure cloud infrastructure, and enterprise software installations that provide early warning of coordinated digital assaults.
The characterization of cyber attacks as “first shots fired” in Russia’s Ukraine invasion validates security experts’ warnings that modern warfare begins with digital infrastructure disruption targeting power grids, communications, and financial systems before conventional military operations.
The 75% attack concentration on American systems reflects the United States’ economic dominance and technological infrastructure that makes domestic targets attractive for both financially motivated criminals seeking ransomware payoffs and nation-state actors pursuing espionage or sabotage.
The targeting priorities of government services, IT, research, and academia reveal attackers’ strategic focus on entities holding valuable intellectual property, classified information, or critical infrastructure control systems rather than random victim selection.
The data theft and extortion motivations encompass both traditional cybercrime where hackers steal information for sale and emerging ransomware tactics where attackers encrypt systems and demand payment, business models generating billions in illicit revenue.
The Lumma Stealer disruption operation involving Department of Justice, Europol, and Japan’s Cybercrime Control Center demonstrates international law enforcement cooperation required to combat transnational cybercrime where attackers operate across jurisdictions exploiting legal boundaries.
The 2,300 seized or blocked malicious domains represent substantial infrastructure investment by Lumma operators, with domain seizures forcing criminals to rebuild command-and-control networks while Microsoft redirects infected devices to safety.
The infected device redirection capability indicates Microsoft’s technical authority over internet infrastructure where the company can modify domain name system routing to prevent compromised computers from communicating with criminal servers.
The “financially motivated crime, nation state actors” distinction separates profit-driven hackers conducting ransomware and fraud from government-sponsored teams pursuing intelligence collection, infrastructure sabotage, or political manipulation through information operations.
The characterization of cyber criminals as “most innovative people on planet Earth” acknowledges adversaries’ technical sophistication and adaptive capabilities that constantly evolve tactics to bypass security measures, requiring defenders to match innovation pace.
The tour timing before Amazon and Alaska Airlines incidents suggests Microsoft sought positive publicity for cybersecurity capabilities, though subsequent high-profile outages raised questions about whether IT failures stemmed from attacks despite official denials.
The Alaska Airlines flight cancellation attribution to infrastructure failure rather than hacking attempts to reassure customers that operational disruptions resulted from technical problems not malicious actors, though distinguishing between causes proves difficult in complex systems.
The Amazon Web Services outage affecting multiple customers highlights cloud infrastructure vulnerabilities where single points of failure can cascade across thousands of dependent businesses, justifying Microsoft’s emphasis on resilience and threat detection.
The 4.5 million daily malware file blocks quantify the scale of Microsoft’s defensive operations, with automated systems scanning files across Windows installations, Azure services, and Microsoft 365 subscriptions to identify and neutralize threats before they execute.
The five billion daily email scans for malicious intent protect Microsoft 365 users from phishing attacks, malware attachments, and social engineering attempts that represent primary infection vectors criminals use to compromise corporate networks and personal devices.
The recommendation to hire personnel rather than solely deploying technology tools acknowledges that effective cybersecurity requires human judgment, creative thinking, and contextual understanding that automated systems cannot replicate despite artificial intelligence advances.



