City
Epaper

Russian hackers accessed sensitive US defence information for 2 yrs

By IANS | Updated: February 17, 2022 10:40 IST

San Francisco, Feb 17 Russian state-sponsored hackers have been targeting US defence contractors for at least two years, ...

Open in App

San Francisco, Feb 17 Russian state-sponsored hackers have been targeting US defence contractors for at least two years, and they acquired information on weapons, aircraft design, and combat communications systems over that period of time.

According to the Cybersecurity and Infrastructure Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA), the state-sponsored actors have targeted both large and small cleared defence contractors (CDCs) and subcontractors with varying levels of cybersecurity protocols and resources.

These CDCs support contracts for the US Department of Defense (DoD) and Intelligence Community, the agencies said in a statement late on Wednesday.

"Russian state-sponsored cyber actors have targeted US CDCs from at least January 2020, through February 2022. The actors leverage access to CDC networks to obtain sensitive data about US defence and intelligence programmes and capabilities," said the CISA.

Compromised entities have included CDCs supporting the US Army, US Air Force, US Navy, US Space Force, and DoD and intelligence programmes.

Through these intrusions, the threat actors have acquired unclassified CDC-proprietary and export-controlled information.

"This theft has granted the actors significant insight into US weapons platforms development and deployment timelines, plans for communications infrastructure, and specific technologies employed by the US government and military," the agencies warned.

Although many contract awards and descriptions are publicly accessible, programme developments and internal company communications "remain sensitive".

In multiple instances, the threat actors maintained persistent access for at least six months.

"Although the actors have used a variety of malware to maintain persistence, the FBI, NSA, and CISA have also observed intrusions that did not rely on malware or other persistence mechanisms," said the agencies.

In instances when the actors have successfully obtained access, the FBI, NSA, and CISA have noted regular and recurring exfiltration of emails and data.

For example, during a compromise in 2021, threat actors exfiltrated hundreds of documents related to the company's products, relationships with other countries, and internal personnel and legal matters, the agencies mentioned.

The FBI, NSA, and CISA now urge all CDCs to investigate suspicious activity in their enterprise and cloud environments.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: Cybersecurity and Infrastructure Security AgencyusSan FranciscoFederal Bureau Of InvestigationSan francisco bayCrime branch of criminal investigation departmentJose d'saFbi washington field officeFederal investigation authorityFederal police divisionUs department of justice-federal bureau of investigation
Open in App

Related Stories

MumbaiAI Voice Scam in Mumbai: Juhu Trader Duped of Rs 50,000 as Fraudster Mimics Brother’s Voice

MumbaiCockroaches Spotted on Air India Flight from San Francisco to Mumbai; Plane Cleaned in Kolkata

InternationalEarthquake in Russia: Quake of Magnitude 8.0 Strikes Kamchatka Peninsula; Tsunami Warning Issued

InternationalNASA Layoffs: 20% or 3,870 Employees to Exit US Space Agency

InternationalMichigan Plane Crash: 2 Killed After Small Aircraft Crashes Into Storage Facility Near Lowell City Airport in US

Technology Realted Stories

TechnologyParacetamol drug not banned in India, says Anupriya Patel

TechnologyBharti Hexacom Q1 profit drops 23 pc, revenue rises over 18 pc YoY

TechnologyBharti Airtel’s Q1 net profit jumps 57 pc to Rs 7,421.8 crore, revenue rises 28 pc

TechnologyGovt’s NCD screening drive diagnoses over 5 cr adults with hypertension, 3 cr with diabetes

TechnologyE-commerce export hubs to lower logistics cost for Indian SMEs