Lockheed Martin, the US government’s top information technology provider, said on Saturday it had thwarted “a significant and tenacious attack” on its information systems network a week ago, but was still working to restore employee access.
No customer, program or employee personal data was compromised thanks to “almost immediate” protective action taken after the attack was detected on May 21, Jennifer Whitlow, a company spokeswoman, said in an e-mailed statement.
She said the company, the world’s biggest aerospace company and the Pentagon’s No. 1 supplier by sales, was working around the clock to restore employee access to the targeted network while maintaining the highest security level.
The US Department of Defense said in statement late on Saturday night that it was working with Lockheed to determine the scope of the attack.
The incident’s impact on the department is “minimal and we don’t expect any adverse effect,” Air Force Lieutenant Colonel April Cunningham said by e-mail.
She declined to specify the nature of the impact, saying that as a matter of policy, the department does not not comment on operational matters.
The Department of Homeland Security (DHS) said that it and the Department of Defense had offered to help curb the risk from the incident.
Lockheed is the maker of the F-16, F-22 and F-35 fighter jets as well as warships and other multibillion-dollar arms systems sold worldwide.
There was no word on where the attack may have originated. Military contractors’ systems contain technical specifications on weapons under development as well as those currently in use.
The US government has offered to help Lockheed analyze “available data in order to provide recommendations to mitigate further risk,” Chris Ortman, a DHS official, said in an e-mailed reply to a query from journalists.
A person with direct knowledge said on Friday that unknown attackers had broken into sensitive networks of Lockheed and several other US military contractors.
Boeing and Northrop -Grumman, the Pentagon’s No. 2 and No. 3 suppliers respectively, declined to discuss matters involving corporate security.
US officials may investigate a cyber breach at a company’s request. DHS, the lead agency for securing federal civilian networks, can deploy a team to analyze infected systems, develop mitigation strategies, advise on efforts to restore service and make recommendations for improving overall network security.
Several top cyber-security experts with extensive government dealings said they were in the dark about the origin of the attack.
“I think it tells us that DHS doesn’t know much about what’s going on either,” said Anup Ghosh, a former senior scientist with the Pentagon’s Defense Advanced Research Projects Agency who worked on securing military networks.
Ghosh, who now runs Invincea, a software security company, said there had been a string of intrusions against defense contractors, security companies and US government labs, including the US Department of Energy’s Oak Ridge National Laboratory, since the start of this year.
These attacks typically were carried out through so-called “spear-phish” inducements to click on a certain link to Web sites or through e-mailed attachments carrying malicious code.
Once so compromised, a -computer can surreptitiously download other code that can log a victim’s key strokes, giving an attacker a path to potentially wide network access.
“Defense industrials is where our military technology secrets are,” Ghosh said in an e-mail interview. “What’s happening here is nothing short of theft of a nation.”
The person with direct knowledge said on Friday that an intrusion at Lockheed was related to a recent breach of “SecurID” token authentication technology from EMC’s EMC.N RSA security division.
Cyber intruders were reported in 2009 to have broken into computers holding data on Lockheed’s projected US$380 billion-plus F-35 fighter program, the Pentagon’s costliest arms purchase.
A series of once-secret US diplomatic cables released by the WikiLeaks Web site in recent months suggests that China has jumped ahead of the US when it comes to cyber espionage.
Republican US lawmakers on Friday criticized US President Joe Biden’s administration after sanctioned Chinese telecoms equipment giant Huawei unveiled a laptop this week powered by an Intel artificial intelligence (AI) chip. The US placed Huawei on a trade restriction list in 2019 for contravening Iran sanctions, part of a broader effort to hobble Beijing’s technological advances. Placement on the list means the company’s suppliers have to seek a special, difficult-to-obtain license before shipping to it. One such license, issued by then-US president Donald Trump’s administration, has allowed Intel to ship central processors to Huawei for use in laptops since 2020. China hardliners
A top Vietnamese property tycoon was on Thursday sentenced to death in one of the biggest corruption cases in history, with an estimated US$27 billion in damages. A panel of three hand-picked jurors and two judges rejected all defense arguments by Truong My Lan, chair of major developer Van Thinh Phat, who was found guilty of swindling cash from Saigon Commercial Bank (SCB) over a decade. “The defendant’s actions ... eroded people’s trust in the leadership of the [Communist] Party and state,” read the verdict at the trial in Ho Chi Minh City. After the five-week trial, 85 others were also sentenced on
‘DELUSIONAL’: Targeting the families of Hamas’ leaders would not push the group to change its position or to give up its demands for Palestinians, Ismail Haniyeh said Israeli aircraft on Wednesday killed three sons of Hamas’ top political leader in the Gaza Strip, striking high-stakes targets at a time when Israel is holding delicate ceasefire negotiations with the militant group. Hamas said four of the leader’s grandchildren were also killed. Ismail Haniyeh’s sons are among the highest-profile figures to be killed in the war so far. Israel said they were Hamas operatives, and Haniyeh accused Israel of acting in “the spirit of revenge and murder.” The deaths threatened to strain the internationally mediated ceasefire talks, which appeared to gain steam in recent days even as the sides remain far
RAMPAGE: A Palestinian man was left dead after dozens of Israeli settlers searching for a missing 14-year-old boy stormed a village in the Israeli-occupied West Bank US President Joe Biden on Friday said he expected Iran to attack Israel “sooner, rather than later” and warned Tehran not to proceed. Asked by reporters about his message to Iran, Biden simply said: “Don’t,” underscoring Washington’s commitment to defend Israel. “We are devoted to the defense of Israel. We will support Israel. We will help defend Israel and Iran will not succeed,” he said. Biden said he would not divulge secure information, but said his expectation was that an attack could come “sooner, rather than later.” Israel braced on Friday for an attack by Iran or its proxies as warnings grew of