Microsoft Threat Intelligence Center published a post according to which in April this year security researchers in Microsoft discovered that attempts were made to compromise popular IoT devices (a VOIP phone, an office printer, and a video decoder) across multiple customer locations. The investigation revealed that the perpetrator used these devices to gain access to corporate networks. In two of the cases, the passwords for the devices were deployed without changing the default manufacturer’s passwords and in the third case, the latest security update had not been applied to the device. These vulnerabilities enabled the attacker to establish a presence on the network and to look for further access. The team attributes the attacks again to Strontium and notified to those who have been targeted. An analysis revealed that one in five attacks was tied to attacks against non-governmental organizations, think tanks, or politically affiliated organizations around the world. The remaining 80% of the attacks have targeted organizations in the following sectors: government, IT, military, defense, medicine, education, and engineering. The team also discovered attacks against Olympic organizing committees, anti-doping agencies, and the hospitality industry.