Last Updated on May 31, 2011
I just finished reading this interesting article that seems to offer a different view for the attack at Lockheed Martin (actually, a lone voice which does not consider the attack related to compromised seeds), that here it is another bolt from the Blue. As a matter of fact Wired reports that a second Defense Contractor, L-3, has been targeted with penetration attacks leveraging information stolen from the infamous RSA Breach. This information was contained into an E-mail, dated April 6, sent to the 5000 group’s employees. t’s not clear from the e-mail whether the hackers were successful in their attack, or how L-3 determined SecurID was involved.
Protecting our network is a top priority and we have a robust set of protocols in place to ensure sensitive information is safeguarded. We have gotten to the bottom of the issue.
Is the only comment of the company.
This revelation occurs few days after the explosive news pertaining the attack led with similar methods to another Defense Contractor, Lockeed Martin.
Maybe all the defense contractors should have followed the wise example of Raytheon (another Defense Contractor) which declared to have taken immediate companywide actions in March when incident information was initially provided to RSA customers, to prevent a widespread disruption of their network.
If confirmed, this event is a further corroboration of the fact the real target of the Hackers was not RSA but their customers, event if at this point I wonder if military contractors are the only targets or if they have been the only ones capable to detect the attempts because of their strict security protocols and policies.
Related articles
- Second Defense Contractor L-3 ‘Actively Targeted’ With RSA SecurID Hacks (wired.com)
- More Random Thoughts on the RSA Breach (paulsparrows.wordpress.com)
- Some Random Thoughts On RSA Breach (paulsparrows.wordpress.com)
Pingback: Exclusive Infographic: all Cyber Attacks on Military Aviation and Aerospace Industry « The Aviationist
Pingback: One Year Of Lulz (Part I) « Il Blog di Paolo Passeri
Pingback: Finally I Saw One! « Il Blog di Paolo Passeri
Pingback: Antisec hacks another Defense Contractor? « Il Blog di Paolo Passeri
Pingback: The Two Faces of Hacking « Il Blog di Paolo Passeri
Pingback: The Mother Of All Breaches « Il Blog di Paolo Passeri
Pingback: Another One Bytes The Dump « Il Blog di Paolo Passeri
Pingback: 2011 CyberAttacks Timeline « Il Blog di Paolo Passeri
Pingback: Seeds On Sale? « Il Blog di Paolo Passeri
Pingback: Another Breach In The Wall « Il Blog di Paolo Passeri
Pingback: Some Random Thoughts On RSA Breach « Il Blog di Paolo Passeri