backtop


Print 19 comment(s) - last by MechanicalTech.. on Nov 14 at 6:07 PM

RSA was not the only contractor to suffer a major breach, warns Lockheed

Amidst a mix of public testimony and leaked intelligence reports suggesting persistent cyber attacks on U.S. institutions by Iran and China, the top supplier to the U.S. Department of Defense (DOD) is issuing a strongly worded warning.  Lockheed Martin Comp. (LMT), whose annual revenues eclipse $47B USD, warned Monday of a rising number of so-called "advanced persistent threats", noting that many of these sophisticated attacks were linked.

According to Chandra McMahon, Lockheed vice president and chief information security officer, her firm has been targeted by a number of serious attacks.  She comments, "The number of campaigns has increased dramatically over the last several years.  The pace has picked up."

All eyes are on Lockheed, after the company was selected to support the Pentagon's Cyber Crime Center (DC3), beating out previous contract holder General Dynamics Corp. (GD).

If you believe the gospel according to Lockheed, so to speak, the weakest part of the security chains at present are contractors.  In a discussion Lockheed executives revealed that EMC Corp. (EMC) subsidiary RSA, makers of the titular cryptographic standard was only one of two major contractor breaches.  Like RSA, the other contractor's info was used in an attempted second-wave attack on Lockheed.

 Lockheed Martin F-22 Raptor [Source: Lockheed Martin]

Lockheed says it is working with both suppliers, as well as other potentially vulnerable partners, to shore up their security.

Charlie Croom, Lockheed's vice president of cybersecurity solutions remarks, "Suppliers are still a huge problem... the adversary has been very significant and tenacious and has really been targeting the defense industrial base."

Lockheed says that some of biggest dangers come from so-called spear phishing attacks, tailor-made attacks which target a specific company and are designed to lure employees to malicious websites or to download from an email files containing malware.  Lockheed also reports seeing a new wave off attacks over social media platforms.

The supplier says that it is aware of many potential cyber-spies creeping around its networks.  It says it had been tracking the spies who hacked RSA for a few years.  While the RSA information gave those parties a ticket to advance their efforts, Lockheed claims it ultimately stopped any significant data loss from occurring via in-house detection, monitoring, and network lockdown capabilities.

Source: Reuters



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Seems fair
By shabby on 11/13/2012 9:26:57 PM , Rating: 2
While america throws bombs at others, others fight back with bits and bytes.




RE: Seems fair
By MechanicalTechie on 11/13/12, Rating: 0
RE: Seems fair
By sixteenornumber on 11/13/2012 10:26:02 PM , Rating: 2
mindless american nationalist checking in! I believe this is more about free tech than anything to do with bombs.


RE: Seems fair
By MechanicalTechie on 11/13/2012 10:30:48 PM , Rating: 2
I happen to agree... but sometimes when it’s given to you on a silver platter its just too hard to resist :)


RE: Seems fair
By sixteenornumber on 11/14/2012 12:23:50 AM , Rating: 2
quote:
I happen to agree... but sometimes when it’s given to you on a silver platter its just too hard to resist :)


more often then not I agree however it's not always the case like when (if i remember correctly) the tokens were stolen from RSA last year. Or the silver paint recipe from DuPont. None of these were silver platters and i doubt the majority of the personnel at LM were either. There is a reason people fly half way around the world for a 15min meeting.

One things for sure, the word can't go on like this forever. Something needs to change.


RE: Seems fair
By MechanicalTechie on 11/14/2012 12:42:30 AM , Rating: 2
Yeah i was directly affected by the RSA token fiasco...

What can change? Its the nature of things... for every supposive defence a new offence is being concocted to defeat it.. other than switching off the net.. hacking will always be a problem


RE: Seems fair
By NellyFromMA on 11/14/2012 9:09:24 AM , Rating: 3
que unjustified mindless anti-american sentiment.


RE: Seems fair
By MadMan007 on 11/14/2012 10:34:23 AM , Rating: 2
Que?


RE: Seems fair
By NellyFromMA on 11/14/2012 2:12:28 PM , Rating: 2
I pictured Mr Garrison from southpark right there lol


RE: Seems fair
By inperfectdarkness on 11/14/2012 3:38:12 AM , Rating: 3
We didn't drop bombs on china. In fact, we prevented the Japanese from massacring large segments of their population for fun (like what happened to a lot of our POW's in Bataan).

Now the Japanese are our close allies and the Chinese like to rape our economy via trade-deficit and artificially devalued currenty--while they simultaneously steal every bit of technology and innovation that they can get from the USA via cyber attack.

I kinda wish we'd never allowed Chennault over there at all. Some thanks we get.


RE: Seems fair
By dark matter on 11/14/2012 9:14:51 AM , Rating: 1
I don't see anyone forcing you Americans to purchase Chinese made products.

And, I'm quite sure that a few "American" companies are happy to use Chinese slave labour, not so they can pass the savings on to their customers, but to make lots and lots of dollars that they pay hardly any tax on.

Check you're own back yard. It's full of shit.


RE: Seems fair
By th3pwn3r on 11/14/2012 9:05:59 AM , Rating: 2
It seems digital/electronic warfare is much cheaper, cost effective and efficient.


RE: Seems fair
By Master Kenobi (blog) on 11/14/2012 4:35:59 PM , Rating: 2
Indeed it is. You can also just deny it if you get caught.


"This is about the Internet.  Everything on the Internet is encrypted. This is not a BlackBerry-only issue. If they can't deal with the Internet, they should shut it off." -- RIM co-CEO Michael Lazaridis














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki