Cepinfo

News, Information and Technology

Menu
  • Home
  • Sitemap
Menu

Russian hackers have obtained sensitive defense information technology by targeting US contractors, according to CISA

Posted on July 22, 2022 by Marie A. Dean

Russian hackers accessed sensitive US defence information for two yrs

Compromised entities have included CDCs supporting the U.s. Army, US Air Force, The states Navy, US Space Force, and DoD and intelligence programmes.

Topics

Russia | United States | cybersecurity


IANS  |
San Francisco



Last Updated at February 17, 2022 11:29 IST


  • ALSO READ

    Microsoft aims to skill 100,000 Indians in cybersecurity by 2022

    Indian cybersecurity manufacture hits $9.8 bn in acquirement: Nasscom

    Microsoft about imitated make of all phishing attacks: Study

    Cyberattacks surge among accelerating Covid-driven digitalisation: WEF study

    FBI, Europol take down servers used in ‘major international cyberattacks’

Russian country-sponsored hackers have been targeting US defence contractors for at least two years, and they acquired information on weapons, aircraft design, and gainsay communications systems over that period of time.

Co-ordinate to the Cybersecurity and Infrastructure Bureau (CISA), Federal Bureau of Investigation (FBI), and National Security Bureau (NSA), the state-sponsored actors have targeted both big and small cleared defence contractors (CDCs) and subcontractors with varying levels of cybersecurity protocols and resources.

These CDCs support contracts for the US Department of Defense (DoD) and Intelligence Customs, the agencies said in a argument late on Wed.

“Russian state-sponsored cyber actors have targeted US CDCs from at to the lowest degree January 2020, through February 2022. The actors leverage access to CDC networks to obtain sensitive data about US defense and intelligence programmes and capabilities,” said the CISA.

Compromised entities accept included CDCs supporting the US Regular army, US Air Force, Usa Navy, The states Space Strength, and DoD and intelligence programmes.

Popular:   DHS creates Cyber Safety Review Board, targets Log4j exploit for its first report

Through these intrusions, the threat actors have acquired unclassified CDC-proprietary and export-controlled data.

“This theft has granted the actors meaning insight into US weapons platforms development and deployment timelines, plans for communications infrastructure, and specific technologies employed past the US regime and military machine,” the agencies warned.

Although many contract awards and descriptions are publicly accessible, program developments and internal visitor communications “remain sensitive”.

In multiple instances, the threat actors maintained persistent access for at to the lowest degree six months.

“Although the actors have used a diversity of malware to maintain persistence, the FBI, NSA, and CISA have too observed intrusions that did not rely on malware or other persistence mechanisms,” said the agencies.

In instances when the actors have successfully obtained access, the FBI, NSA, and CISA have noted regular and recurring exfiltration of emails and data.

For example, during a compromise in 2021, threat actors exfiltrated hundreds of documents related to the visitor’due south products, relationships with other countries, and internal personnel and legal matters, the agencies mentioned.

The FBI, NSA, and CISA now urge all CDCs to investigate suspicious activeness in their enterprise and cloud environments.

–IANS

na/dpb

(Merely the headline and film of this study may have been reworked by the Business Standard staff; the remainder of the content is auto-generated from a syndicated feed.)


Dearest Reader,

Business Standard has e’er strived hard to provide up-to-date information and commentary on developments that are of interest to you and take wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offer have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-nineteen, we continue to remain committed to keeping you informed and updated with credible news, administrative views and incisive commentary on topical issues of relevance.
Nosotros, all the same, have a request.

Popular:   Block is contacting 8.2 million customers after a former employee downloaded company reports

As nosotros boxing the economic impact of the pandemic, nosotros need your support fifty-fifty more, so that we tin continue to offer you more quality content. Our subscription model has seen an encouraging response from many of yous, who have subscribed to our online content. More subscription to our online content can only help u.s. achieve the goals of offering you even amend and more relevant content. We believe in costless, off-white and credible journalism. Your back up through more subscriptions can help the states do the journalism to which we are committed.

Support quality journalism and
subscribe to Business Standard.

Digital Editor

First Published: Thu, February 17 2022. 11:29 IST

Russian hackers have obtained sensitive defense information technology by targeting US contractors, according to CISA

Source: https://www.business-standard.com/article/international/russian-hackers-accessed-sensitive-us-defence-information-for-2-yrs-122021700302_1.html

Archives

  • July 2022 (50)
  • June 2022 (128)
  • May 2022 (121)

Menu

  • Terms of Use
  • Privacy Policy
  • Cookie Privacy Policy
  • DMCA

Archives

©2022 Cepinfo | Design: Newspaperly WordPress Theme