Dragos

Canvas Category Software : Operational Technology : Cybersecurity

Website | Blog

Primary Location Hanover, Maryland, United States

Financial Status VC; Koch Disruptive Technologies, BlackRock

Dragos was founded by renowned ICS/OT practitioners who have defeated adversaries for the U.S. government, ally nations, and global firms. Today, Dragos is on a mission to protect the world’s most critical infrastructure and safeguard civilization. We know that’s a mission you can get behind.

Assembly Line

Dragos Acquires Network Perception, Delivers the Industry’s Most Comprehensive Visibility of OT Environments

📅 Date:

🔖 Topics: Acquisition

🏢 Organizations: Dragos, Network Perception


Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, announced the acquisition of Network Perception, makers of NP-View, an award-winning network visualization platform for OT networks. The acquisition will bolster the Dragos Platform with industry-leading OT network visibility along with compliance and segmentation analysis and reporting capabilities tailored to safeguard critical OT environments.

With the upcoming integration, the combined power of the Dragos Platform and NP-View will deliver dual-layer visibility into OT environments by revealing both real-time connections and potential pathways in a cohesive view. This will empower security teams to proactively defend against risks that are invisible to conventional solutions and for the first time fully map the intent versus reality of their network configurations, identifying key vulnerabilities along the attack path before they can be exploited.

In the future, through the integration of NP-View’s topology and firewall rules analysis into the Dragos Platform, customers will be able to map their OT environment network topology more effectively, decide where to place Dragos Platform network sensors, map vulnerabilities to attack paths, and evaluate configuration and policy drift. The dual layer visibility into what assets are communicating and what communication paths are possible will be a powerful security and compliance view of the OT environment. NP-View’s network segmentation capabilities will enhance Dragos’s strong defense mechanisms against lateral movement by adversaries within OT environments.

Read more at Business Wire

Dragos Raises an Additional $74M in Series D Round Extension

📅 Date:

🔖 Topics: Funding Event

🏢 Organizations: Dragos, WestCap


Dragos, Inc., the global leader in cybersecurity for industrial controls systems (ICS)/operational technology (OT) environments, announced a $74 million Series D extension, led by strategic operating and investing firm WestCap.

The Series D funding extension will bolster Dragos’s ability to make ICS/OT cybersecurity more accessible around the world. This year, Dragos has already expanded across Western Europe and the DACH region, building on its established presence in the UK. This summer, Dragos entered into an agreement with Macnica to provide Dragos’s cybersecurity solutions in Japan, signifying Dragos’s expansion in Asia-Pacific beyond its presence in Australia and New Zealand.

Read more at Dragos Blog

Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems

📅 Date:

✍️ Author: Andy Greenberg

🔖 Topics: cybersecurity, industrial control system

🏢 Organizations: Dragos


On Wednesday, the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the NSA, and the FBI jointly released an advisory about a new hacker toolset potentially capable of meddling with a wide range of industrial control system equipment. More than any previous industrial control system hacking toolkit, the malware contains an array of components designed to disrupt or take control of the functioning of devices, including programmable logic controllers (PLCs) that are sold by Schneider Electric and OMRON and are designed to serve as the interface between traditional computers and the actuators and sensors in industrial environments. Another component of the malware is designed to target Open Platform Communications Unified Architecture (OPC UA) servers—the computers that communicate with those controllers.

Dragos says the malware has the ability to hijack target devices, disrupt or prevent operators from accessing them, permanently brick them, or even use them as a foothold to give hackers access to other parts of an industrial control system network. He notes that while the toolkit, which Dragos calls “Pipedream,” appears to specifically target Schneider Electric and OMRON PLCs, it does so by exploiting underlying software in those PLCs known as Codesys, which is used far more broadly across hundreds of other types of PLCs. This means that the malware could easily be adapted to work in almost any industrial environment. “This toolset is so big that it’s basically a free-for-all,” Caltagirone says. “There’s enough in here for everyone to worry about.”

Read more at WIRED

Implications of Log4j Vulnerability for Operational Technology (OT) Networks

📅 Date:

🔖 Topics: cybersecurity

🏢 Organizations: Dragos


This cross-cutting vulnerability, which is vendor-agnostic and affects both proprietary and open-source software, will leave a wide swathe of industries exposed to remote exploitation, including electric power, water, food and beverage, manufacturing, transportation, and more. Log4j is found in popular open-source repositories used in numerous industrial applications, such as Object Linking and Embedding for Process Control (OPC) Foundation’s Unified Architecture (UA) Java Legacy. Additionally, adversaries can leverage this vulnerability in proprietary Supervisory Control and Data Acquisition (SCADA) and Energy Management Systems (EMS) which make use of Java in their codebase.

Read more at Dragos Blog