Hybrid warfare redefined beyond borders
Geopolitical tensions in Ukraine are running high. The landscape of conflict today not only features active combatants but also places companies in critical infrastructure sectors such as energy, supply chain, healthcare, transportation, and banking in digital crosshairs.
As a high-intensity physical conflict draws closer and the situation becomes increasingly hostile among adversaries, companies in these sectors should be on high alert for a wave of cyberattacks. We have been anticipating and preparing for an influx of cyber threat actors to target the public and private sectors across the globe. Based on historical threats related to this specific geopolitical conflict and geopolitical or social crises in general, there is an expectation that there will be cyberattacks against private sector companies and critical infrastructure providers outside Ukraine. Case in point, a series of cyberattacks took the websites of the Ukrainian army, the defense ministry, and major banks offline.
In recent years, state actors have become increasingly bold in tapping into cyber threat actors to conduct attacks to disrupt any adversary and damage their economy. For example, we have seen the use of groups such as the Armageddon group linked to FSB to perform cyberattacks. This has resulted in a combination of cyberwar tactics, strategically used alongside more traditional kinetic warfare to achieve a multiplicity of ends, hence the description “hybrid warfare”.
It is clear that public- and private-sector organizations need to be on alert and ready should more global cyber-attacks be launched (in whatever capacity) as a part of the situation in Ukraine.
Increasing warnings must not be taken lightly and should resonate with organizations worldwide, especially those in the critical infrastructure sectors—just look at the increase of breaches and ransomware attacks resulting from the COVID-19 pandemic.
It is imperative to use the early indicators that cyber intelligence can provide to protect your executives and employees at scale. All of them.
In an analysis of executive exposures across major sectors, including finserv, energy and pharma, and telco, a series of recent research reports by digital risk protection leader Constella illustrates just how much sensitive personal data of company executives in the top 20 Fortune Global 500 companies are in circulation. The research identified nearly 10 million exposed records related to corporate credentials, with 59% of executives’ credentials exposed in a breach in the last three years. This paints an alarming profile of vulnerabilities and high-risk attack vectors for threat actors to capitalize on.
Constella urges all organizations to comprehensively assess their cyber risk profiles and cybersecurity preparedness strategies to best understand the nature of the vulnerabilities that may impact their key individuals—including executives, employees, and other key stakeholders—third parties and supply chains, and digital and physical infrastructure.
Given this, Constella recommends that organizations take proactive steps to safeguard their company and its assets from a digital attack.
You can begin doing this by asking the following three questions:
1. Are all of your employees and executives aware of the likely vectors of attack and entry points for cyberattacks against private organizations that may result as an outcome of geopolitical unrest?
2. Does your organization understand its current vulnerabilities and digital risk profile, including the exposed data related to all your employees, executives, and partners that can be weaponized to inflict financial or reputational harm on your organization?
3. Does your organization monitor, detect and respond, in real-time, 24×7, to any sensitive exposures related to your employees or executives?
Digital Risk Protection (DRPS) is key to protecting executives, VIPs or employees — including public authorities and executives in private companies, specifically those linked to critical infrastructure such as energy, financial services, telecommunications, or pharma — which are consistently high-value targets in hybrid cyberwar operations.
Bad actors utilize cyberwarfare against us. We need to deploy strategies and tools to protect ALL of our employees, not just a select few executives. It has been said for a decade that physical and cyber security will converge.
The future is now, if you are not using cyber tools to see early indicators of threats to your cyber and physical assets you are like a battleship without a radar. Your immediate line of sight is just not enough.
Request a demo of Constella’s geopolitical protection platform and learn how you can stay one step ahead of geopolitical threats that could adversely impact your people, your brand, or your assets.