Jump to content
  • Security giant Dragos hit by cyberattack blow

    aum

    • 403 views
    • 2 minutes
     Share


    • 403 views
    • 2 minutes

    Crooks steal company data and attempted to deploy ransomware

     

    Cybersecurity firm Dragos has been targeted by a threat actor whose goal was seemingly to deploy ransomware (opens in new tab) and extort the company.

     

    The attempt failed, and Dragos shared the details of what had happened, in hopes to help other companies who might find themselves in a similar situation in the future.

     

    In a blog post (opens in new tab), Dragos reported that a threat actor managed to gain access to the company’s systems through a previously compromised email account belonging to a newly employed member of staff. They used the access to impersonate the new employee and access resources “typically used” by new sales employees, in SharePoint and the Dragos contact management system. They also managed to obtain a report with IP addresses associated with a customer, prompting Dragos to reach out to that customer immediately.

     

    "Regrettable" theft

     

    The company believes they had spotted the attacker on time and prevented them from doing any major damage.

     

    “We are confident that our layered security controls prevented the threat actor from accomplishing what we believe to be their primary objective of launching ransomware,” the blog reads. “They were also prevented from accomplishing lateral movement, escalating privileges, establishing persistent access, or making any changes to the infrastructure.”

     

    However, that did not stop the attackers from trying to extort the company for the data they had taken. Soon after, they reached out to company executives via WhatsApp, threatening to release sensitive data to the dark web. “WE HAVE EVERYTHING.”, one of the messages reads.

     

    As the company did not flinch, the attackers then resorted to mentioning family members, as well as reaching out to other Dragos contacts to try and trigger a response.

     

    “While the external incident response firm and Dragos analysts feel the event is contained, this is an ongoing investigation,” the blog further states. “The data that was lost and likely to be made public because we chose not to pay the extortion is regrettable. However, it is our hope that highlighting the methods of the adversary will help others consider additional defenses against these approaches so that they do not become a victim to similar efforts.”

     

    Source


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...