www.extrahop.com
Open in
urlscan Pro
54.148.110.19
Public Scan
Submitted URL: http://app.wiredata.extrahop.com/e/er?utm_campaign=2022-q2-april-newsletter-general-dynamic-nam-emea-a&utm_medium=email&utm_sourc...
Effective URL: https://www.extrahop.com/company/blog/2022/a-cyber-response-to-an-economic-battle/?utm_campaign=2022-q2-april-newsletter-...
Submission: On April 14 via api from SE — Scanned from DE
Effective URL: https://www.extrahop.com/company/blog/2022/a-cyber-response-to-an-economic-battle/?utm_campaign=2022-q2-april-newsletter-...
Submission: On April 14 via api from SE — Scanned from DE
Form analysis
2 forms found in the DOMName: untitledForm-1367515949663 — POST https://s1701.t.eloqua.com/e/f2
<form method="POST" id="form107" name="untitledForm-1367515949663" role="form" action="https://s1701.t.eloqua.com/e/f2" class="reset-disabled" data-parsley-validate="" data-parsley-trigger="focusout" data-onload="extrahop.undisableForm"
novalidate="">
<input type="hidden" name="elqFormName" value="untitledForm-1367515949663">
<input type="hidden" name="elqSiteId" value="1701">
<input type="hidden" name="elqCampaignId">
<input type="hidden" name="campaignId" value="70180000001EqjnAAC">
<input type="hidden" name="elqCustomerGUID">
<input type="hidden" name="elqCookieWrite" value="0">
<input type="hidden" name="GA_Medium" value="">
<input type="hidden" name="GA_Source" value="">
<input type="hidden" name="GA_Campaign" value="">
<input type="hidden" name="GA_Content" value="">
<input type="hidden" name="GA_Term" value="">
<input type="hidden" name="GA_Product" value="">
<input type="hidden" name="GA_Region" value="">
<input type="hidden" name="GA_Funnelstage" value="">
<input type="hidden" name="GA_Version" value="">
<input type="hidden" name="gclid" value="">
<input type="hidden" name="FormURL" value="">
<input type="hidden" name="uniqueid" value="">
<input type="hidden" name="GA_Adgroup" value="">
<input type="hidden" name="redirectUrl" value="https://www.extrahop.com/company/newsletter-signup-success/" data-sync-host="www">
<div class="inline-input">
<div class="form-group email">
<input id="email" class="form-control garlic-auto-save" name="email" type="email" required="" placeholder="Email Address">
</div>
<div class="form-group">
<input type="submit" class="btn btn-basic btn-green" value="Subscribe" data-track-newsletter-subscribe="">
</div>
</div>
</form>
<form>
<input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>
Text Content
* The Platform EXTRAHOP REVEAL(X) 360 CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE FOR THE HYBRID ENTERPRISE. Learn More Explore Reveal(x) How It Works Competitive Comparison Why Decryption Matters Integrations and Automations Cybersecurity Services Complimentary Shields Up Assessment What is Network Detection & Response (NDR)? Cloud-Native Security Solutions Reveal(x) Enterprise: Self-Managed NDR * Solutions -------------------------------------------------------------------------------- SOLUTIONS With the power of machine learning, gain the insight you need to solve pressing challenges. FOR SECURITY Stand up to threats with real-time detection and fast response. Learn More > FOR CLOUD Gain complete visibility for cloud, multi-cloud, or hybrid environments. Learn More > FOR IT OPS Share information, boost collaboration without sacrificing security. Learn More > BY INITIATIVE * Complimentary Shields Up Assessment * Advanced Threats * Ransomware Mitigation * Multicloud & Hybrid Cloud Security * Implement Zero Trust * Security Operations Transformation BY VERTICAL * Financial Services * Healthcare * e-Commerce and Retail * U.S. Public Sector Complimentary SHIELDS UP ASSESSMENT Align with and implement CISA's cybersecurity guidance Start Now Get Additional Shields Up Guidance > * Customers -------------------------------------------------------------------------------- CUSTOMERS Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support. COMMUNITY * Customer Portal Login * Solution Bundles Gallery * Community Forums * Customer Stories SERVICES * Services Overview * Reveal(x) Advisor * Deployment TRAINING * Training Overview * Training Sessions SUPPORT * Support Overview * Documentation * Hardware Policies Featured Customer Story WIZARDS OF THE COAST Wizards of the Coast Delivers Frictionless Security for Agile Game Development with ExtraHop Read More See All Customer Stories > * Partners -------------------------------------------------------------------------------- PARTNERS Our partners help extend the upper hand to more teams, across more platforms. CHANNEL PARTNERS * Channel Overview * Managed Services Providers * Overwatch Managed NDR INTEGRATION PARTNERS * CrowdStrike * Amazon Web Services * Google Cloud Security * All Technology Partners PANORAMA PROGRAM * Partner Program Information * Partner Portal Login * Become a Partner Featured Integration Partner CROWDSTRIKE Detect network attacks. Correlate threat intelligence and forensics. Auto-contain impacted endpoints. Inventory unmanaged devices and IoT. Read More See All Integration Partners > * Blog * More * About Us * News & Events * Careers * Resources * About Us * The ExtraHop Advantage * What Is Cloud-Native? * Leadership * Board of Directors * Contact Us * Explore the Interactive Online Demo * Sign Up for a Live Attack Simulation * Upcoming Webinars and Events * Newsroom * ExtraHop Media Kit and Brand Guidelines HUNTER CHALLENGE Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event. Read More * Careers at ExtraHop * Search Openings * Connect on LinkedIn * All Resources * Customer Stories * Complimentary Shields Up Assessment * Ransomware Attacks in 2021: A Retrospective * White Papers * Datasheets * Industry Reports * Webinars * Cyberattack Glossary * Network Protocols Glossary * Documentation * Firmware * Training Videos Login Logout Start Demo THE PLATFORM SOLUTIONS CUSTOMERS PARTNERS BLOG MORE START THE DEMO CONTACT US Back EXTRAHOP REVEAL(X) 360 Cloud-native visibility, detection, and response for the hybrid enterprise. Learn More HOW IT WORKS COMPETITIVE COMPARISON WHY DECRYPTION MATTERS INTEGRATIONS AND AUTOMATIONS CYBERSECURITY SERVICES COMPLIMENTARY SHIELDS UP ASSESSMENT WHAT IS NETWORK DETECTION & RESPONSE (NDR)? CLOUD-NATIVE SECURITY SOLUTIONS REVEAL(X) ENTERPRISE: SELF-MANAGED NDR Back SOLUTIONS Learn More SECURITY CLOUD IT OPS USE CASES EXPLORE BY INDUSTRY VERTICAL Back CUSTOMERS Customer resources, training, case studies, and more. Learn More CUSTOMER PORTAL LOGIN CYBERSECURITY SERVICES TRAINING EXTRAHOP SUPPORT Back PARTNERS Partner resources and information about our channel and technology partners. Learn More CHANNEL PARTNERS INTEGRATIONS AND AUTOMATIONS PARTNERS Back BLOG Learn More Back ABOUT US NEWS & EVENTS CAREERS RESOURCES Back ABOUT US See what sets ExtraHop apart, from our innovative approach to our corporate culture. Learn More THE EXTRAHOP ADVANTAGE WHAT IS CLOUD-NATIVE? CONTACT US Back NEWS & EVENTS Get the latest news and information. Learn More SIGN UP FOR A LIVE ATTACK SIMULATION UPCOMING WEBINARS AND EVENTS Back CAREERS We believe in what we're doing. Are you ready to join us? Learn More CAREERS AT EXTRAHOP SEARCH OPENINGS CONNECT ON LINKEDIN Back RESOURCES Find white papers, reports, datasheets, and more by exploring our full resource archive. All Resources CUSTOMER STORIES COMPLIMENTARY SHIELDS UP ASSESSMENT RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE CYBERATTACK GLOSSARY NETWORK PROTOCOLS GLOSSARY DOCUMENTATION FIRMWARE TRAINING VIDEOS BLOG THE LONG TAIL OF WAR: A CYBER RESPONSE TO AN ECONOMIC BATTLE * Published by Patrick Dennis on March 22, 2022 Last week I wrote a blog strongly encouraging my peer CEOs and other corporate leaders to take decisive and immediate steps to shore up their cybersecurity posture in accordance with CISA's recent Shields Up guidance. As a result, I got many questions about what was driving my sense of urgency. After all, cyberattacks have, thus far, appeared to play a very minor role in the conflict over Ukraine. My sense of urgency stems from the fact that this is the calm before the cyber storm. In the first weeks of the invasion of Ukraine, the tactics have been primarily kinetic warfare (land, air, and sea), which is more effective in destroying targets and giving the invading Russian army strategic access to supply lines and staging areas. Cyberwarfare tactics serve as bookends to a kinetic campaign—providing intelligence and disrupting the opposition's operations to gain and maintain an advantage. The Russian government and its affiliates have a long history of using cyberwarfare tactics to gather intelligence and sow disruption. Since 2012, Ukraine has been repeatedly hit by these tactics, but they date back to at least 2007 with attacks on Estonian government, media, and banking organizations. Now we are on the cusp of witnessing what comes after the kinetic invasion. I believe we are about to enter a new era—one in which the carefully-toed line between cyber espionage and cyberwarfare is decisively crossed. There are three key factors surrounding the war in Ukraine that have led us to this tipping point. 1. Coordinated private sector service sanctions (e.g. SWIFT access) 2. Uncoordinated private sector sanctions (e.g. companies that stand in support of Ukraine) 3. Crowdsourcing as a tactic in warfare (e.g. Anonymous, Volunteer Ukraine IT Army, Conti, Ghostwriter) There is a lot to unpack in each of these areas, and I will explore the implications of each over the course of a three-blog series. But before I dive in, let me be unequivocal: The invasion of Ukraine is an abhorrent act that, as of the time of writing, has taken the lives of 780 civilians and displaced 5 million people, either internally or as refugees. The choice to support Ukraine by Western governments and private companies is a moral and ethical one that weighs heavily on me and my fellow business leaders. It's also one that comes with the very real risk of proportional retaliation by Russia and its allies, both government and independent. It's that retaliation for which I want to make sure every organization is prepared. Get a Complimentary Shields Up Security Assessment (1) COORDINATED PRIVATE SECTOR SERVICE SANCTIONS Since the invasion of Ukraine began in late February, countries around the world, led by the United States and Western Europe have coordinated an advanced economic operation targeting both Russia and Russian oligarchs. This includes broad-based elimination of Russian access to the SWIFT network, which is responsible for carrying almost all international financial transactions. This action is expected to have significant impacts on Russia's ability to finance the war. While the involved western countries have not initiated combat operations to support Ukraine (e.g. no fly zones) these financial and economic operations are profoundly disruptive. It is reasonable to expect a proportional response against the West for the foreseeable future. Proportional response has long been a principle in warfare, and Russia has made clear that it views current economic operation as an act of war. Given that Russia has been thoroughly cut off from most global financial markets, it's reasonable to expect the response to take a non-financial form—likely cyberattacks aimed at inflicting commensurate financial pain. The history of Russian cyberattacks suggests that these attacks will come not only from within the Russian government, but from Russian affiliates and sympathizers that have government support. The acceleration of crowdsourcing tactics (covered more below) implies that we could see attacks coming from cyber militias composed of individual Russian sympathizers around the world. These attacks are not likely to be limited to government entities. The goal of proportional response is to inflict proportional pain. Russian citizens now find themselves cut off from their savings, cut off from goods and services, and cut off from many communications channels, including Instagram and other social media platforms. To inflict similar pain on Western countries and their citizens, I expect to see Russia and its allies and affiliates target critical infrastructure—not just water and electric grids, but healthcare systems, banking systems, and other core services that we have too long taken for granted. Russia has a long track record of effectively hitting these targets in Ukraine and other countries. It's not a stretch to believe that they'll extend those attacks to a much greater number of targets. In the next blog, I'll delve into the uncoordinated private sector sanctions, and what this means for private companies, both in and outside of critical sectors. Read Part 2: Walking Into the Line of Fire Read Part 3: The Volunteer Cyber Army * Posted in Cybersecurity, Industry Trends * See other posts by Patrick Dennis STOP BREACHES 84% FASTER Investigate a live attack in the full product demo of ExtraHop Reveal(x), network detection and response, to see how it accelerates workflows. Start Demo RELATED BLOGS 3.11.22 SHIELDS UP: A CEO'S GUIDANCE FOR CORPORATE LEADERS ON CYBERSECURITY READINESS Cybersecurity is essential for any modern organization. As the risk of cyberattacks rises, now is the time for CEOs to reconnect with SecOps teams. Patrick Dennis 3.14.22 PRACTICAL STEPS FOR RESPONDING TO THE CISA WARNING ON RUSSIAN CYBER ATTACKS Learn common attack techniques and get practical tips for implementing CISA's Shields Up guidance. Mark Bowling 2.24.22 BUILD RESILIENCE AMID RISING RISK OF RUSSIAN CYBERTHREATS With the invasion of Ukraine underway, the risk of cyberattacks is rising. Learn what to expect and steps you can take to reduce your attack surface. Mark Bowling SIGN UP TO STAY INFORMED Javascript is required to submit this form + ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More Global Headquarters 520 Pike St Suite 1600 Seattle, WA 98101 United States EMEA Headquarters WeWork 8 Devonshire Square London EC2M 4PL United Kingdom APAC Headquarters 3 Temasek Avenue Centennial Tower Level 18 Singapore 039190 PLATFORM * Reveal(x) 360 * How It Works * Competitive Comparison * Why Decryption Matters * Integrations and Automations * Cybersecurity Services * Complimentary Shields Up Assessment * What is Network Detection & Response (NDR)? * Cloud-Native Security Solutions * Reveal(x) Enterprise: Self-Managed NDR SOLUTIONS * Security * Cloud * IT Ops * Use Cases * Industries CUSTOMERS * Customer Portal Login * Services Overview * Training Overview * Support Overview PARTNERS * Channel Overview * Technology Integration Partners * Partner Program Information BLOG MORE * About Us * Contact Us * News & Events * Careers * Resources * Copyright ExtraHop Networks 2022 * Terms of Use * Privacy Policy * Facebook * Twitter * LinkedIn * Instagram * YouTube Close suggested results