Skip to main content

US defense contractors’ networks breached by hackers

hackers-lockheed-martin
Image used with permission by copyright holder

Hackers have allegedly broken into the systems of some of the most prominent defense contractors, including Lockheed Martin Corp and other companies that develop weapon systems for the US Department of Defense, reports Reuters, who spoke with a person familiar with the matter.

To breach the systems, hackers reportedly duplicated electronic login keys known as “SecurID,” which are made by the EMC corporation’s RSA security division. It is not yet known if any data was stolen by the hackers. But because of the highly sensitive nature of the information stored on Lockheed’s and other’s systems — data about classified future weapon systems being built for the US military, as well as weapons currently in us in Iraq and Afghanistan — it’s not difficult to assume what kind of info the hackers were after.

Widely used to protect sensitive data, SecurIDs are far more robust than a standard username/password combo that one would use to login to, say, Facebook. Instead, SecurID generates a new series of digits every couple of minutes that the user must enter into the system, along with a unique user pin. Failure to login before the next set of numbers is generated results in denied access to the system.

The breach, said to have been carried out in March, actually involved more than one attack. First came the initial breach on the RSA division, during which hackers stole data the taught them how to copy the security keys. Then came a wave of malware and phishing attacks launched to gain additional user and network data that would allow for greater access to the systems. This type of attack is known as an “Advanced Persistent Threat” or APT.

In addition to an internal investigation into the matter, EMC says it took immediate steps to protect its customers, which included “hardening our IT infrastructure.”

Rich Moy, president of information security firm NSS Labs, tells Reuters that the nature of the attack means a threat remains.

“Given the military targets, and that millions of compromised keys are in circulation, this is not over.”

Editors' Recommendations

Topics
Andrew Couts
Former Digital Trends Contributor
Features Editor for Digital Trends, Andrew Couts covers a wide swath of consumer technology topics, with particular focus on…
How to update your Gmail picture on desktop and mobile
A man holding a teacup staring at laptop screen.

There are lots of reasons why you'd want to change your Gmail profile picture. Maybe you have a great, new selfie you want to show off. Or you just want to update your work email with a photo that's recent and professional-looking. Whatever the reason, we can help you update your Gmail picture in just a few quick steps. We've also got you covered whether you choose to change your photo via Gmail's desktop website or through its mobile app.

Read more
How to build your own GPT chatbot without coding
Infinix Zero 30 5G Android phone in gold color with ChatGPT virtual assistant.

For $20 per month, a ChatGPT Plus subscription unlocks far more than just access to GPT-4. With a little know-how, you’ll actually be able to use some of OpenAI’s more advanced features to build a custom GPT chatbot all your own. We did it ourselves, and the results were simply astounding! And while this may sound like an intimidating task to undertake, you won’t even need to know any coding.

Read more
How to change your MAC address on Windows and Mac
The TP-Link Archer AXE7800 tri-band Wi-Fi 6E router in a room.

Each and every web-connected component in your household has a MAC address. One can think of these 12-digit identifiers as digital name tags that computers, smartphones, tablets, and smart TVs use to say “present” on our home Wi-Fi networks. MAC addresses are also integral in maintaining a safe and reliable gateway to the internet.

Read more