-

ExtraHop Introduces Breakthrough Decryption and Threat Detection Capabilities for Microsoft Environments

Out-of-Band Decryption and Powerful AI Help Security Teams Defend Critical Active Directory Infrastructure and Identify Microsoft Protocol Abuse Used to Carry Out A New Class of Advanced Attacks.

SEATTLE--(BUSINESS WIRE)--ExtraHop, the leader in cloud-native network detection and response (NDR), today announced that it has expanded decryption support for Microsoft authentication and application protocols, providing high-fidelity detection of malicious activity associated with nearly two-thirds of the most exploited network protocols. This first-and-only decryption capability detects a new class of advanced attacks, including ‘living-off-the-land’ and Active Directory Kerberos Golden Ticket attacks, that exploit proprietary Microsoft protocols to evade security controls and traditional monitoring tools like next-generation firewalls (NGFW) and web proxies. Advanced decryption also detects high risk CVE exploitation such as PrintNightmare, ZeroLogon, and ProxyLogon, and provides proactive defense against future zero-day exploits.

Learn more about how insecure protocols expose organizations to cyber risk.

According to a Joint Cybersecurity Advisory issued by the U.S. FBI, CISA, the UK National Cyber Security Centre, and the Australian Cyber Security Centre, encrypted protocols such as Microsoft Server Message Block v3 are used to mask lateral movement and other advanced tactics in 60% of the 30 most exploited network vulnerabilities. Of the top 11 most exploited vulnerabilities, four involve Microsoft systems. Three of those four can be exploited via an encrypted channel.

Unlike NGFW and web proxies, ExtraHop Reveal(x) 360 detects sophisticated emerging attack techniques with line-rate decryption of the most commonly abused Microsoft protocols such as SMBv3, Active Directory Kerberos, Microsoft Remote Procedure Call (MS-RPC), NTLM, LDAP, WINRM, in addition to TLS 1.3. This decryption capability also detects post-compromise activity that encrypted traffic analysis (ETA) misses, including ransomware campaigns that exploit the PrintNightmare vulnerability.

“In 2021, the sophistication of ransomware has increased significantly, with techniques that were once the sole purview of nation states now regularly being used for illicit financial gain,” said Jon Oltsik, Sr. Principal Analyst, ESG Research. “This new class of attacks, including Living-off-the-Land and Active Directory Golden Ticket, exploit organizations’ biggest blind spot— encrypted traffic. ExtraHop has long supported secure decryption of east-west SSL and TLS 1.3 traffic, and can now extend that support for critical Microsoft protocols at the center of today’s most insidious attacks.”

“Organizations are blind to encrypted malicious activity happening laterally within the east-west corridor,” said Sri Sundaralingam, VP, Security and Cloud Solutions at ExtraHop. “Even technologies like firewalls and encrypted traffic analysis that claim to provide visibility fail to detect attacks that use encrypted communications to exploit vulnerabilities commonly seen in advanced threat campaigns. ExtraHop Reveal(x) 360 can identify— with fidelity— exploitation and protocol abuse associated with major CVEs, both today and in the future.”

ExtraHop Reveal(x) 360 goes far beyond the limited protocol identification and statistical analysis offered by NGFW, web proxies, and ETA, securely decrypting and fully parsing Microsoft Active Directory authentication protocols (Kerberos and NTLM) and Microsoft Windows application-level protocols using passive, out-of-band decryption for rapid and accurate detection of advanced threat activity. Reveal(x) 360 also provides forensic-level record data on encrypted traffic, including specific SQL queries, commands sent via MS-RPC, and LDAP enumeration behavior for comprehensive investigation and response. With Reveal(x) 360, customers can:

  • Prevent unauthorized access and privilege escalation attempts via Microsoft Active Directory infrastructure.
  • Monitor for ‘living-off-the-land’ tactics used during east-west lateral movements to expose hidden threats.
  • Defend against high risk vulnerabilities like PrintNightmare and Microsoft Active Directory being exploited in advanced threat campaigns to carry out disruptive attacks.

To learn more about the role of decryption in defending against advanced threats, visit the ExtraHop Decryption Blog.

Click here to learn more about how to detect attacks using Microsoft Protocol Decryption.

About ExtraHop

Cyberattackers have the advantage. ExtraHop is on a mission to help you take it back with security that can’t be undermined, outsmarted, or compromised. Our dynamic cyber defense platform, Reveal(x) 360, helps organizations detect and respond to advanced threats—before they compromise your business. We apply cloud-scale AI to petabytes of traffic per day, performing line-rate decryption and behavioral analysis across all infrastructure, workloads, and data-in-flight. With complete visibility from ExtraHop, enterprises can detect malicious behavior, hunt advanced threats, and forensically investigate any incident with confidence. ExtraHop has been recognized as a market leader in network detection and response by IDC, Gartner, Forbes, SC Media, and numerous others.

When you don’t have to choose between protecting your business and moving it forward, that’s security uncompromised. Learn more at www.extrahop.com.

Contacts

Rachel Pepple
ExtraHop
pr@extrahop.com

ExtraHop

Details
Headquarters: Seattle, Washington
CEO: Greg Clark
Employees: 700
Organization: PRI

Release Versions

Contacts

Rachel Pepple
ExtraHop
pr@extrahop.com

More News From ExtraHop

ExtraHop® Unveils Advanced Network Detection Capabilities to Stop Malicious PowerShell Attacks

SEATTLE--(BUSINESS WIRE)--ExtraHop®, a leader in modern network detection and response (NDR), today announced powerful new capabilities to detect the malicious use of PowerShell. These enhancements deliver the critical visibility needed to dismantle the attack kill chain, providing essential insight to stop lateral movement in its tracks. Remote management tools like PowerShell have become a notable weapon for attackers, like the Qilin Ransomware-as-a-Service (RaaS) operation, which has hit man...

ExtraHop® Expands Presence in EMEA to Meet Enterprise Demand for NDR

SEATTLE & LONDON--(BUSINESS WIRE)--ExtraHop®, a leader in modern network detection and response (NDR), today announced its expansion into the Nordics and Benelux markets. This strategic move strengthens the company's European footprint on the heels of a period of significant enterprise growth. Following a strong 2024, in which ExtraHop more than doubled its sales to Global 2000 customers in EMEA, the company is bringing its proven momentum to two of the continent's most dynamic markets housing...

ExtraHop® Report Finds Ransomware Payouts Hit Record Highs as Attackers Adapt

SEATTLE--(BUSINESS WIRE)--ExtraHop®, a leader in modern network detection and response (NDR), today released the 2025 ExtraHop Global Threat Landscape Report, which offers a comprehensive analysis of the ever-shifting cybersecurity landscape. The report examines the ever-expanding attack surface, detailing the evolving tactics threat actors are leveraging to exploit organizations and carry out lucrative attacks. According to the findings, threat actors are shifting away from broad, indiscrimina...
Back to Newsroom