Microsoft said on Wednesday that it had notified almost 10,000 barter in the past year that they’d been the target of state-sponsored attacks.

The Windows maker said the attacks originated from countries like Iran, North Korea, and Russia.

“This data demonstrates the cogent extent to which nation-states abide to rely on cyberattacks as a tool to gain intelligence, access cartography or accomplish other objectives,” Tom Burt, accumulated vice admiral of chump aegis & trust at Microsoft, wrote in a blog post.

About 84 percent of these attacks were aimed at its action customers, and the actual 16 percent — about 1,600 — targeted customer claimed email accounts.

Since ablution its AccountGuard belvedere for attention autonomous elections last August, the aggregation articular 781 nation-sponsored attacks targeting organizations that make use of the technology — 95 percent of which were amid in the US.

Based on data aggregate by the Microsoft Threat Intelligence Center, Burt said they have seen all-encompassing action from the actors Holmium (APT33) and Mercury operating from Iran, Thallium (APT38) operating from North Korea, and two actors operating from Russia called Strontium (APT28 aka Fancy Bear) and Yttrium (APT29).

The cyber espionage group Strontium in accurate has been belled for their captivation in the 2016 hacks of the Autonomous National Committee and the NotPetya attacks adjoin Ukranian banks and basement in June 2017.

According to cybersecurity firm CrowdStrike, the aggregate has operated since 2008 and is believed to be alive for the GRU, Russia‘s aggressive intelligence service.

To aegis adjoin such adopted arrest to autonomous processes, Microsoft said it will begin rolling out a free, open-source software artefact called ElectionGuard, which it said uses encryption to “enable a new era of secure, absolute voting.”

The aggregation is alive with acclamation apparatus vendors and local governments to deploy the system in a pilot affairs for the accessible 2020 US election.

The system uses a tracking code to allow a voter to verify that his or her vote has been recorded and has not been tampered with. This analysis affection will be enabled by homomorphic encryption, Burt noted, adding it will be accessible through GitHub as a software development kit (SDK) later this summer.