• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Latest Cybersecurity News

Dragos Cyberattack Disclosed – Internal Systems Targeted

John Greenwood Posted On May 11, 2023
0



Dragos Cyberattack

Industrial cybersecurity company Dragos recently revealed a significant “cybersecurity event” in which a notorious cybercrime gang attempted to breach their defenses and infiltrate their internal network to encrypt devices.

Although Dragos asserts that the threat actors were unsuccessful in breaching their network or cybersecurity platform, they were able to gain access to the company’s SharePoint cloud service and contract management system.

This incident highlights the growing persistence of cybercriminals and the importance of robust security measures.

Breach Details and Timeline

During the attempted breach, the criminal group exploited the personal email account of a newly hired sales employee, leveraging their personal information to impersonate a Dragos employee and initiate initial steps in the employee onboarding process.

Dragos Cyberattack
Dragos Cyberattack Incident Timeline (Source: Dragos)

The cybercriminals breached Dragos’ SharePoint cloud platform and proceeded to download “general use data” while also accessing 25 intelligence reports typically restricted to customers.

Despite the 16-hour window in which the attackers had access to the compromised account, they failed to infiltrate several critical Dragos systems.

Systems such as messaging, IT helpdesk, financial, request for proposal (RFP), employee recognition, and marketing systems remained secure due to robust role-based access control (RBAC) rules.

Response and Prevention Measures

Eleven hours into the attack, the cybercriminals sent an extortion email to Dragos executives, which went unnoticed for five hours as it was sent outside business hours.

Once the message was discovered, Dragos swiftly disabled the compromised user account, terminated all active sessions, and blocked the attackers’ infrastructure from accessing company resources.

Through these layered security controls, Dragos successfully thwarted the threat actors’ primary objective of deploying ransomware and impeded their lateral movement, privilege escalation, and infrastructure modifications.

Extortion Attempts and Consequences

In an attempt to extort the company, the cybercrime group threatened to publicly disclose the incident by reaching out to Dragos executives, senior employees, and their family members through public contacts and personal emails.

Despite the potential loss and public disclosure of data resulting from their decision not to pay the extortion demand, Dragos remains confident that the event has been contained, emphasizing that the incident is still under investigation.

Relevant Indicators of Compromise

One of the IP addresses associated with the attack (144.202.42[.]216) has previously been linked to SystemBC malware and Cobalt Strike, commonly utilized by ransomware gangs for remote access to compromised systems.

The presence of this IP address in recent BlackBasta ransomware attacks provides some leads in identifying the potential suspects. However, determining the exact threat actor behind the attack remains challenging due to the multiple ransomware gangs known to employ SystemBC.

Ongoing Investigation

Dragos continues to collaborate with external incident response firms and their analysts to investigate the cybercrime group responsible for this incident.

As the investigation progresses, Dragos aims to provide further details on the attackers’ identity and intentions.

The company’s commitment to strengthening cybersecurity measures underscores the importance of constant vigilance in the face of evolving cyber threats

Share the article with your friends


Cybersecuritydata securityPrivacy


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search