www.extrahop.com Open in urlscan Pro
54.148.110.19  Public Scan

Submitted URL: http://app.wiredata.extrahop.com/e/er?utm_campaign=2022-q2-april-newsletter-general-dynamic-nam-emea-a&utm_medium=email&utm_sourc...
Effective URL: https://www.extrahop.com/company/blog/2022/a-cyber-response-to-an-economic-battle/?utm_campaign=2022-q2-april-newsletter-...
Submission: On April 14 via api from SE — Scanned from DE

Form analysis 2 forms found in the DOM

Name: untitledForm-1367515949663POST https://s1701.t.eloqua.com/e/f2

<form method="POST" id="form107" name="untitledForm-1367515949663" role="form" action="https://s1701.t.eloqua.com/e/f2" class="reset-disabled" data-parsley-validate="" data-parsley-trigger="focusout" data-onload="extrahop.undisableForm"
  novalidate="">
  <input type="hidden" name="elqFormName" value="untitledForm-1367515949663">
  <input type="hidden" name="elqSiteId" value="1701">
  <input type="hidden" name="elqCampaignId">
  <input type="hidden" name="campaignId" value="70180000001EqjnAAC">
  <input type="hidden" name="elqCustomerGUID">
  <input type="hidden" name="elqCookieWrite" value="0">
  <input type="hidden" name="GA_Medium" value="">
  <input type="hidden" name="GA_Source" value="">
  <input type="hidden" name="GA_Campaign" value="">
  <input type="hidden" name="GA_Content" value="">
  <input type="hidden" name="GA_Term" value="">
  <input type="hidden" name="GA_Product" value="">
  <input type="hidden" name="GA_Region" value="">
  <input type="hidden" name="GA_Funnelstage" value="">
  <input type="hidden" name="GA_Version" value="">
  <input type="hidden" name="gclid" value="">
  <input type="hidden" name="FormURL" value="">
  <input type="hidden" name="uniqueid" value="">
  <input type="hidden" name="GA_Adgroup" value="">
  <input type="hidden" name="redirectUrl" value="https://www.extrahop.com/company/newsletter-signup-success/" data-sync-host="www">
  <div class="inline-input">
    <div class="form-group email">
      <input id="email" class="form-control garlic-auto-save" name="email" type="email" required="" placeholder="Email Address">
    </div>
    <div class="form-group">
      <input type="submit" class="btn btn-basic btn-green" value="Subscribe" data-track-newsletter-subscribe="">
    </div>
  </div>
</form>

<form>
  <input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   EXTRAHOP
   REVEAL(X) 360
   
   CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE
   FOR THE HYBRID ENTERPRISE.
   
   Learn More
   
   Explore Reveal(x)
   
   How It Works
   
   Competitive Comparison
   
   Why Decryption Matters
   
   Integrations and Automations
   
   Cybersecurity Services
   
   Complimentary Shields Up Assessment
   
   What is Network Detection & Response (NDR)?
   
   Cloud-Native Security Solutions
   
   Reveal(x) Enterprise: Self-Managed NDR

 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   FOR SECURITY
   
   Stand up to threats with real-time detection and fast response.
   
   Learn More >
   
   FOR CLOUD
   
   Gain complete visibility for cloud, multi-cloud, or hybrid environments.
   
   Learn More >
   
   FOR IT OPS
   
   Share information, boost collaboration without sacrificing security.
   
   Learn More >
   
   BY INITIATIVE
   
    * Complimentary Shields Up Assessment
    * Advanced Threats
    * Ransomware Mitigation
    * Multicloud & Hybrid Cloud Security
    * Implement Zero Trust
    * Security Operations Transformation
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * U.S. Public Sector
   
   Complimentary
   
   
   SHIELDS UP ASSESSMENT
   
   Align with and implement CISA's cybersecurity guidance
   
   Start Now
   
   Get Additional Shields Up Guidance >

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Solution Bundles Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Reveal(x) Advisor
    * Deployment
   
   TRAINING
   
    * Training Overview
    * Training Sessions
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Hardware Policies
   
   Featured Customer Story
   
   
   WIZARDS OF THE COAST
   
   Wizards of the Coast Delivers Frictionless Security for Agile Game
   Development with ExtraHop
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
    * Overwatch Managed NDR
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Amazon Web Services
    * Google Cloud Security
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   Detect network attacks. Correlate threat intelligence and forensics.
   Auto-contain impacted endpoints. Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * News & Events
    * Careers
    * Resources
   
    * About Us
    * The ExtraHop Advantage
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Complimentary Shields Up Assessment
    * Ransomware Attacks in 2021: A Retrospective
    * White Papers
    * Datasheets
    * Industry Reports
    * Webinars
   
    * Cyberattack Glossary
    * Network Protocols Glossary
    * Documentation
    * Firmware
    * Training Videos


Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


EXTRAHOP
REVEAL(X) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

HOW IT WORKS

COMPETITIVE COMPARISON

WHY DECRYPTION MATTERS

INTEGRATIONS AND AUTOMATIONS

CYBERSECURITY SERVICES

COMPLIMENTARY SHIELDS UP ASSESSMENT

WHAT IS NETWORK DETECTION & RESPONSE (NDR)?

CLOUD-NATIVE SECURITY SOLUTIONS

REVEAL(X) ENTERPRISE: SELF-MANAGED NDR

Back


SOLUTIONS



Learn More

SECURITY

CLOUD

IT OPS

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

TRAINING

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


NEWS & EVENTS


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More

THE EXTRAHOP ADVANTAGE

WHAT IS CLOUD-NATIVE?

CONTACT US

Back


NEWS & EVENTS

Get the latest news and information.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

COMPLIMENTARY SHIELDS UP ASSESSMENT

RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE

CYBERATTACK GLOSSARY

NETWORK PROTOCOLS GLOSSARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS


BLOG


THE LONG TAIL OF WAR: A CYBER RESPONSE TO AN ECONOMIC BATTLE

 * Published by Patrick Dennis on March 22, 2022

Last week I wrote a blog strongly encouraging my peer CEOs and other corporate
leaders to take decisive and immediate steps to shore up their cybersecurity
posture in accordance with CISA's recent Shields Up guidance. As a result, I got
many questions about what was driving my sense of urgency. After all,
cyberattacks have, thus far, appeared to play a very minor role in the conflict
over Ukraine.

My sense of urgency stems from the fact that this is the calm before the cyber
storm. In the first weeks of the invasion of Ukraine, the tactics have been
primarily kinetic warfare (land, air, and sea), which is more effective in
destroying targets and giving the invading Russian army strategic access to
supply lines and staging areas. Cyberwarfare tactics serve as bookends to a
kinetic campaign—providing intelligence and disrupting the opposition's
operations to gain and maintain an advantage. The Russian government and its
affiliates have a long history of using cyberwarfare tactics to gather
intelligence and sow disruption. Since 2012, Ukraine has been repeatedly hit by
these tactics, but they date back to at least 2007 with attacks on Estonian
government, media, and banking organizations. Now we are on the cusp of
witnessing what comes after the kinetic invasion.

I believe we are about to enter a new era—one in which the carefully-toed line
between cyber espionage and cyberwarfare is decisively crossed. There are three
key factors surrounding the war in Ukraine that have led us to this tipping
point.

 1. Coordinated private sector service sanctions (e.g. SWIFT access)
 2. Uncoordinated private sector sanctions (e.g. companies that stand in support
    of Ukraine)
 3. Crowdsourcing as a tactic in warfare (e.g. Anonymous, Volunteer Ukraine IT
    Army, Conti, Ghostwriter)

There is a lot to unpack in each of these areas, and I will explore the
implications of each over the course of a three-blog series. But before I dive
in, let me be unequivocal: The invasion of Ukraine is an abhorrent act that, as
of the time of writing, has taken the lives of 780 civilians and displaced 5
million people, either internally or as refugees. The choice to support Ukraine
by Western governments and private companies is a moral and ethical one that
weighs heavily on me and my fellow business leaders. It's also one that comes
with the very real risk of proportional retaliation by Russia and its allies,
both government and independent. It's that retaliation for which I want to make
sure every organization is prepared.

Get a Complimentary Shields Up Security Assessment


(1) COORDINATED PRIVATE SECTOR SERVICE SANCTIONS

Since the invasion of Ukraine began in late February, countries around the
world, led by the United States and Western Europe have coordinated an advanced
economic operation targeting both Russia and Russian oligarchs. This includes
broad-based elimination of Russian access to the SWIFT network, which is
responsible for carrying almost all international financial transactions. This
action is expected to have significant impacts on Russia's ability to finance
the war. While the involved western countries have not initiated combat
operations to support Ukraine (e.g. no fly zones) these financial and economic
operations are profoundly disruptive.

It is reasonable to expect a proportional response against the West for the
foreseeable future. Proportional response has long been a principle in warfare,
and Russia has made clear that it views current economic operation as an act of
war. Given that Russia has been thoroughly cut off from most global financial
markets, it's reasonable to expect the response to take a non-financial
form—likely cyberattacks aimed at inflicting commensurate financial pain.

The history of Russian cyberattacks suggests that these attacks will come not
only from within the Russian government, but from Russian affiliates and
sympathizers that have government support. The acceleration of crowdsourcing
tactics (covered more below) implies that we could see attacks coming from cyber
militias composed of individual Russian sympathizers around the world.

These attacks are not likely to be limited to government entities. The goal of
proportional response is to inflict proportional pain. Russian citizens now find
themselves cut off from their savings, cut off from goods and services, and cut
off from many communications channels, including Instagram and other social
media platforms.

To inflict similar pain on Western countries and their citizens, I expect to see
Russia and its allies and affiliates target critical infrastructure—not just
water and electric grids, but healthcare systems, banking systems, and other
core services that we have too long taken for granted. Russia has a long track
record of effectively hitting these targets in Ukraine and other countries. It's
not a stretch to believe that they'll extend those attacks to a much greater
number of targets.

In the next blog, I'll delve into the uncoordinated private sector sanctions,
and what this means for private companies, both in and outside of critical
sectors.



Read Part 2: Walking Into the Line of Fire

Read Part 3: The Volunteer Cyber Army



 * Posted in Cybersecurity, Industry Trends
 * See other posts by Patrick Dennis


STOP BREACHES 84% FASTER

Investigate a live attack in the full product demo of ExtraHop Reveal(x),
network detection and response, to see how it accelerates workflows.

Start Demo


RELATED BLOGS

3.11.22


SHIELDS UP: A CEO'S GUIDANCE FOR CORPORATE LEADERS ON CYBERSECURITY READINESS

Cybersecurity is essential for any modern organization. As the risk of
cyberattacks rises, now is the time for CEOs to reconnect with SecOps teams.

Patrick Dennis

3.14.22


PRACTICAL STEPS FOR RESPONDING TO THE CISA WARNING ON RUSSIAN CYBER ATTACKS

Learn common attack techniques and get practical tips for implementing CISA's
Shields Up guidance.

Mark Bowling

2.24.22


BUILD RESILIENCE AMID RISING RISK OF RUSSIAN CYBERTHREATS

With the invasion of Ukraine underway, the risk of cyberattacks is rising. Learn
what to expect and steps you can take to reduce your attack surface.

Mark Bowling


SIGN UP TO STAY INFORMED

Javascript is required to submit this form


+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x) 360
 * How It Works
 * Competitive Comparison
 * Why Decryption Matters
 * Integrations and Automations
 * Cybersecurity Services
 * Complimentary Shields Up Assessment
 * What is Network Detection & Response (NDR)?
 * Cloud-Native Security Solutions
 * Reveal(x) Enterprise: Self-Managed NDR

SOLUTIONS

 * Security
 * Cloud
 * IT Ops
 * Use Cases
 * Industries

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Training Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * Contact Us
 * News & Events
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2022
 * Terms of Use
 * Privacy Policy

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube




Close


suggested results