backtop


Print 19 comment(s) - last by MechanicalTech.. on Nov 14 at 6:07 PM

RSA was not the only contractor to suffer a major breach, warns Lockheed

Amidst a mix of public testimony and leaked intelligence reports suggesting persistent cyber attacks on U.S. institutions by Iran and China, the top supplier to the U.S. Department of Defense (DOD) is issuing a strongly worded warning.  Lockheed Martin Comp. (LMT), whose annual revenues eclipse $47B USD, warned Monday of a rising number of so-called "advanced persistent threats", noting that many of these sophisticated attacks were linked.

According to Chandra McMahon, Lockheed vice president and chief information security officer, her firm has been targeted by a number of serious attacks.  She comments, "The number of campaigns has increased dramatically over the last several years.  The pace has picked up."

All eyes are on Lockheed, after the company was selected to support the Pentagon's Cyber Crime Center (DC3), beating out previous contract holder General Dynamics Corp. (GD).

If you believe the gospel according to Lockheed, so to speak, the weakest part of the security chains at present are contractors.  In a discussion Lockheed executives revealed that EMC Corp. (EMC) subsidiary RSA, makers of the titular cryptographic standard was only one of two major contractor breaches.  Like RSA, the other contractor's info was used in an attempted second-wave attack on Lockheed.

 Lockheed Martin F-22 Raptor [Source: Lockheed Martin]

Lockheed says it is working with both suppliers, as well as other potentially vulnerable partners, to shore up their security.

Charlie Croom, Lockheed's vice president of cybersecurity solutions remarks, "Suppliers are still a huge problem... the adversary has been very significant and tenacious and has really been targeting the defense industrial base."

Lockheed says that some of biggest dangers come from so-called spear phishing attacks, tailor-made attacks which target a specific company and are designed to lure employees to malicious websites or to download from an email files containing malware.  Lockheed also reports seeing a new wave off attacks over social media platforms.

The supplier says that it is aware of many potential cyber-spies creeping around its networks.  It says it had been tracking the spies who hacked RSA for a few years.  While the RSA information gave those parties a ticket to advance their efforts, Lockheed claims it ultimately stopped any significant data loss from occurring via in-house detection, monitoring, and network lockdown capabilities.

Source: Reuters



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Seems fair
By th3pwn3r on 11/14/2012 9:05:59 AM , Rating: 2
It seems digital/electronic warfare is much cheaper, cost effective and efficient.


RE: Seems fair
By Master Kenobi (blog) on 11/14/2012 4:35:59 PM , Rating: 2
Indeed it is. You can also just deny it if you get caught.


"We basically took a look at this situation and said, this is bullshit." -- Newegg Chief Legal Officer Lee Cheng's take on patent troll Soverain














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki