Patrick Kelley interviewed by 11Alive/NBC regarding City of Griffin $1m phishing scam.

"We can patch operating systems all day long, but it's a lot harder to patch the human in us," cybersecurity expert Patrick Kelley said. Kelley isn't surprised the city of Griffin got scammed. "It happens every week," he said. What is uncommon is how much money the crooks got. The scheme went through the city's water department. An email came through that looked legitimate from their vendor - P F Moon & Co. The email said they needed to change the banking information for the account, so the city employee sent it over. "We get that these changes need to take place, but an email just isn't good enough," Kelley said. Read More

0 Comments

Patrick Kelley, interviewed by 11Alive/NBC News, regarding Georgia Judicial Cyber Attack

The Atlanta City digital systems were hijacked by a ransomware attack in 2018. Officials said this attack is much less serious than the one that affected the city. However, Cyber Security Expert Patrick Kelley said it is still a big deal. "To me there's a dramatic impact to this,"Kelley said. Kelley is talking to some of the judges impacted by the hack, and they told him they can't access any of their information. He also believes the judicial council likely doesn't know the full scope of the attack. Read more

Comments Off on Patrick Kelley, interviewed by 11Alive/NBC News, regarding Georgia Judicial Cyber Attack

Raspberry Pi used to hack NASA – Lack of basic security controls to blame.

Critical Path Security has spent quite a deal of time using Raspberry Pi devices for adversarially-based physical penetration tests, with the hope of compromising the client business network. It is one of the most successful tactics that are employed, as the devices are quite small and versatile. Using a battery pack and a small WiFi antenna, Critical Path Security has proven hundreds of vulnerabilities in some of the most well-defended networks in the world. This has led to increasing the security posture of our customers. When we read the most recent breach report, there was little surprise to find that NASA Jet Propulsion Laboratory (JPL) was unable adhere to the NIST standards, including the 1st requirement which is "Inventory and Control of Hardware Assets". It is a vast, interconnected network of 26,174 computer systems with 3,511 being servers. With the extensive distribution of legacy systems, the ability to breach a…

Comments Off on Raspberry Pi used to hack NASA – Lack of basic security controls to blame.

XENOTIME Now Targeting Electric Utility Companies

Xenotime, the hacker group that was first observed in 2017 when it sabotaged the safety equipment of an oil refinery in Saudi Arabia. At the time, it was able to access the ICS portion of the network through traditional lateral movement. It matters as Triton was designed to be not only destructive but to do so in a way that could harm or kill people. One Information Security group indicated that there are only three groups currently known to focus on this outcome, but Critical Path Security staff have observed more. Though we've worked with Electric Membership Organizations and observed several breaches, we can't definitively tie the incidents to Xenotime.  However, we're confident that their tactics would prove effective. Dragos has stated that "Trisis has been observed doing some of the slow, deliberate groundwork to launch an attack.". We believe that Industrial Control Systems are experiencing increased attacks due to…

Comments Off on XENOTIME Now Targeting Electric Utility Companies