Patrick Kelley interviewed by 11Alive/NBC News – Money laundering using Uber Rides.

That person uses online chat groups and other social media to reach out and recruit Uber and Lyft drivers for the scheme. Uber says that part is key, because if there are no drivers willing to participate – there is no scheme. Once on board, the drivers can say where and when they want to take a ride, allowing them to make money on everyday errands or even long distance trips they were already planning to take for personal reasons. Ensign says the ringleader overseas initiates the ride by hacking into existing Uber accounts. Uber says credit card and personal information are encrypted, so there’s no concern about identity theft, but weak and leaked passwords are allowing crooks to manipulate the service. People usually never even know their account has been hacked because their credit card information gets swapped out with a stolen card to pay for the ride. The…

0 Comments

Promotion! Glenn Holzmacher, Director of Platform Development

We are pleased to announce the promotion of Glenn Holzmacher to Director of Platform Development (Léargas). Glenn has been with Critical Path Security since the beginning, during which time he has held positions in Security and Threat Analysis, proving himself to be a committed company advocate. Glenn came to Critical Path Security from ConcieHRge and brought with him energy and enthusiasm that he has continued to use while leading his employees to consistently improve the development of Léargas. His background in full stack development gives him an overall understanding of how to improve customer satisfaction with ongoing and cutting edge development of Léargas, and his ability to motivate his team has led to his continued success in the United States, Canada, Mexico, and Ireland. Please join us in congratulating him on his new position. Regards, Patrick Kelley CTO, Critical Path Security

0 Comments

Léargas – Road Apples

  “I have no illusions of the future. Or maybe it’s all an illusion. I don’t know. I’ve always been ready for it.” — Gord Downie When the Critical Path Security team set out to build Léargas, we knew it would be quite the undertaking. For some of us it was about unfinished business, for others it was an opportunity to solve interesting problems in novel ways, using a mix of open source platforms and custom development. It started as a desire to build a Next Generation Network Security Monitoring platform that performed analysis in multi-dimensional and multi-contextual methods, without the brutal licensing fees. It turned in to so much more! Today, we’re thrilled to announce a list of brand new features available for our current and future customers. North-South / East-West - Our clients can now add profile-based sensor and aggregation points anywhere they wish in their network. Léargas will…

Comments Off on Léargas – Road Apples

Detecting Cyber Attacks on ICS Networks

Critical Path Security is proud to announce that it has extended the Léargas passive security platform’s capabilities to include monitoring for ICS networks!    This release includes signatures and detections for both Modbus and DNP3 protocols, which are commonly used to manage power plants, oil pipelines, water treatment facilities and manufacturing plants where a single errant function call can ripple through vital systems causing failures and creating potentially dangerous situations. Our new signatures and detections enable Léargas to highlight potentially dangerous communications and identify malformed packets without the need to install an agent on a single endpoint, in real time! These signatures and detections are mapped to the 7 Stages of the Lockheed Martin Cyber Kill Chain: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives. Unlike the common CVSS scoring system, this rating structure provides insight to an attack as it progresses through an environment and…

0 Comments
Close Menu