Cyber Security Firm Dragos Targeted By Hackers

The CEO of cyber security company Dragos, Robert M Lee, received a message earlier this year from an organised crime group claiming that it had broken into Dragos’s employee email account. They  threatened Lee that they would release the company’s data unless a ransom were paid. He refused to negotiate with the attackers, so the hackers increased the amounts.

In addition, they found his son's passport, school and phone number online. Lee said the message was clear: pay up or your family is at risk. "When you start talking about your child's life and safety, things take a different turn," Lee told reporters.  He is a veteran of both the US military and the National Security Agency.

The criminal group that threatened Lee is known to resort to “swatting”, a practice when someone maliciously calls the local authorities pretending to be a victim of an armed attack, prompting a police SWAT team being sent to a target’s home. “Basically, they’re trying to get someone killed,” said Lee, who was told by local police that their best option in that situation was to lie down on the floor.

Lee is a recognised authority in the industrial cyber security industry and co-founded Dragos, a global technology leader in cyber security for industrial controls systems operational technology environments.

Other Hacking Attacks

The threats are widespread and can be highly inventive. Examples include a Ukrainian hacker who mailed a gram of heroin to the home of Brian Krebs, a journalist turned cyber security analyst. They then had a florist deliver a huge bouquet in the shape of a cross to Krebs' house. In other incidents, victims have been instructed to send money to cyber security professionals' bank accounts in an attempt to trap them. A North Korean hacker group impersonated security researchers on LinkedIn, with prospective contacts then sending malware hidden in an encryption key.

"We're an organisation that's constantly engaged with threat actors, so we have to think about our own security, from a physical standpoint," said Charles Carmakal, chief technology officer at Mandiant , which is called upon to investigate major breaches, such as recently at the State Department and to other US agencies.

But some analysts have warned that the situation is being exacerbated by the deep involvement of Western companies in the cybersecurity of Ukraine, a country that has faced the most sustained and sophisticated cyber attacks on record. "It's going to get worse," said the investigator whose home was searched. "Someone is going to get killed" was the ominous prediction he made in the Financial Times.

Dragos have firmly maintained that they will not engage nor pay ransom at any point. It's a hard stance to take, a lot of organisation will buckle under the pressure.

TechWar:     FT:     Bloomberg:     SC Magazine:     Bleeping Computer:     Dragos:     LinkedIn

You Might Also Read: 

Police Officers At Severe Risk As Personal Data Exposed:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Understanding Generative AI
Generative AI Could Replace The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Accurics

Accurics

Accurics enables self-healing cloud native infrastructure by codifying security throughout your development lifecycle.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

SteelGate

SteelGate

SteelGate’s core capabilities are centered around architecture design and engineering of network, systems, and cybersecurity solutions.