Secret F-35, P-8, C-130 data stolen in Australian defence contractor hack

Flyaway

ACCESS: USAP
Senior Member
Joined
21 January 2015
Messages
10,648
Reaction score
12,248
The security this contractor was using seems to be almost nonexistent.

In November 2016, the Australian Signals Directorate (ASD) was alerted by a "partner organisation" that an attacker had gained access to the network of a 50-person aerospace engineering firm that subcontracts to the Department of Defence.

Restricted technical information on the F-35 Joint Strike Fighter, the P-8 Poseidon maritime patrol aircraft, the C-130 transport aircraft, the Joint Direct Attack Munition (JDAM) smart bomb kit, and "a few Australian naval vessels" was among the sensitive data stolen from a small Australian defence contractor in 2016.

The secret information was restricted under the International Traffic in Arms Regulations (ITAR), the US system designed to control the export of defence- and military-related technologies, according to Mitchell Clarke, an incident response manager at the ASD who worked on the case.

http://www.zdnet.com/article/secret-f-35-p-8-c-130-data-stolen-in-australian-defence-contractor-hack/
 
Rather more details here than in the article I linked to in the Enter the Cyber Dragon thread. Leaving the Admin passwords at default really is unforgivable, it's about the most basic error possible. But it points to an institutional problem with the company's management, they weren't interested enough in security to ensure they appointed competent staff. Essentially the whole organisation needs its clearance pulling.
 

Similar threads

Back
Top Bottom