Lockheed Martin, the US government’s top information technology provider, said on Saturday it had thwarted “a significant and tenacious attack” on its information systems network a week ago, but was still working to restore employee access.
No customer, program or employee personal data was compromised thanks to “almost immediate” protective action taken after the attack was detected on May 21, Jennifer Whitlow, a company spokeswoman, said in an e-mailed statement.
She said the company, the world’s biggest aerospace company and the Pentagon’s No. 1 supplier by sales, was working around the clock to restore employee access to the targeted network while maintaining the highest security level.
The US Department of Defense said in statement late on Saturday night that it was working with Lockheed to determine the scope of the attack.
The incident’s impact on the department is “minimal and we don’t expect any adverse effect,” Air Force Lieutenant Colonel April Cunningham said by e-mail.
She declined to specify the nature of the impact, saying that as a matter of policy, the department does not not comment on operational matters.
The Department of Homeland Security (DHS) said that it and the Department of Defense had offered to help curb the risk from the incident.
Lockheed is the maker of the F-16, F-22 and F-35 fighter jets as well as warships and other multibillion-dollar arms systems sold worldwide.
There was no word on where the attack may have originated. Military contractors’ systems contain technical specifications on weapons under development as well as those currently in use.
The US government has offered to help Lockheed analyze “available data in order to provide recommendations to mitigate further risk,” Chris Ortman, a DHS official, said in an e-mailed reply to a query from journalists.
A person with direct knowledge said on Friday that unknown attackers had broken into sensitive networks of Lockheed and several other US military contractors.
Boeing and Northrop -Grumman, the Pentagon’s No. 2 and No. 3 suppliers respectively, declined to discuss matters involving corporate security.
US officials may investigate a cyber breach at a company’s request. DHS, the lead agency for securing federal civilian networks, can deploy a team to analyze infected systems, develop mitigation strategies, advise on efforts to restore service and make recommendations for improving overall network security.
Several top cyber-security experts with extensive government dealings said they were in the dark about the origin of the attack.
“I think it tells us that DHS doesn’t know much about what’s going on either,” said Anup Ghosh, a former senior scientist with the Pentagon’s Defense Advanced Research Projects Agency who worked on securing military networks.
Ghosh, who now runs Invincea, a software security company, said there had been a string of intrusions against defense contractors, security companies and US government labs, including the US Department of Energy’s Oak Ridge National Laboratory, since the start of this year.
These attacks typically were carried out through so-called “spear-phish” inducements to click on a certain link to Web sites or through e-mailed attachments carrying malicious code.
Once so compromised, a -computer can surreptitiously download other code that can log a victim’s key strokes, giving an attacker a path to potentially wide network access.
“Defense industrials is where our military technology secrets are,” Ghosh said in an e-mail interview. “What’s happening here is nothing short of theft of a nation.”
The person with direct knowledge said on Friday that an intrusion at Lockheed was related to a recent breach of “SecurID” token authentication technology from EMC’s EMC.N RSA security division.
Cyber intruders were reported in 2009 to have broken into computers holding data on Lockheed’s projected US$380 billion-plus F-35 fighter program, the Pentagon’s costliest arms purchase.
A series of once-secret US diplomatic cables released by the WikiLeaks Web site in recent months suggests that China has jumped ahead of the US when it comes to cyber espionage.
CONFRONTATION: The water cannon attack was the second this month on the Philippine supply boat ‘Unaizah May 4,’ after an incident on March 5 The China Coast Guard yesterday morning blocked a Philippine supply vessel and damaged it with water cannons near a reef off the Southeast Asian country, the Philippines said. The Philippine military released video of what it said was a nearly hour-long attack off the Second Thomas Shoal (Renai Shoal, 仁愛暗沙) in the contested South China Sea, where Chinese ships have unleashed water cannons and collided with Philippine vessels in similar standoffs in the past few months. The China Coast Guard and other vessels “once again harassed, blocked, deployed water cannons, and executed dangerous maneuvers” against a routine rotation and resupply mission to
GLOBAL COMBAT AIR PROGRAM: The potential purchasers would be limited to the 15 nations with which Tokyo has signed defense partnership and equipment transfer deals Japan’s Cabinet yesterday approved a plan to sell future next-generation fighter jets that it is developing with the UK and Italy to other nations, in the latest move away from the country’s post-World War II pacifist principles. The contentious decision to allow international arms sales is expected to help secure Japan’s role in the joint fighter jet project, and is part of a move to build up the Japanese arms industry and bolster its role in global security. The Cabinet also endorsed a revision to Japan’s arms equipment and technology transfer guidelines to allow coproduced lethal weapons to be sold to nations
Thousands of devotees, some in a state of trance, gathered at a Buddhist temple on the outskirts of Bangkok renowned for sacred tattoos known as Sak Yant, paying their respects to a revered monk who mastered the practice and seeking purification. The gathering at Wat Bang Phra Buddhist temple is part of a Thai Wai Khru ritual in which devotees pay homage to Luang Phor Pern, the temple’s formal abbot, who died in 2002. He had a reputation for refining and popularizing the temple’s Sak Yant tattoo style. The idea that tattoos confer magical powers has existed in many parts of Asia
ON ALERT: A Russian cruise missile crossed into Polish airspace for about 40 seconds, the Polish military said, adding that it is constantly monitoring the war to protect its airspace Ukraine’s capital, Kyiv, and the western region of Lviv early yesterday came under a “massive” Russian air attack, officials said, while a Russian cruise missile breached Polish airspace, the Polish military said. Russia and Ukraine have been engaged in a series of deadly aerial attacks, with yesterday’s strikes coming a day after the Russian military said it had seized the Ukrainian village of Ivanivske, west of Bakhmut. A militant attack on a Moscow concert hall on Friday that killed at least 133 people also became a new flash point between the two archrivals. “Explosions in the capital. Air defense is working. Do not