Nato Investigates Blackmail Efforts From Cyber Criminals Against Mbda Missile Systems – Clearancejobs

NATO Investigates Blackmail Efforts from Cyber Criminals Against MBDA Missile Systems – ClearanceJobs

The European, multi-country, joint venture, MBDA Missile Systems finds itself in the center of a NATO investigation into how information pertaining to MBDA’s missile system has found its way on the darknet where it is being offered for sale to any and all buyers willing to cough up 15 bitcoins. The BBC quoted a NATO spokesperson as having said, “We are assessing claims relating to data allegedly stolen from MBDA. We have no indication that any NATO network has been compromised.”
In late-July “andrastea” published a ransom note to MBDA, and said that they were “a group of independent specialists and researchers in the field of cybersecurity. We found critical vulnerabilities in your network infrastructure and gained access to the company’s files and confidential data. Currently, the volume of downloaded data is approximately 60 GB (gigabytes). The downloaded data contains confidential and closed (SIC) information about the employees of your company, which took part in the development of closed military projects of MBDA (PLANCTON, CRONOS, CA SIRIUS, EMADS, B1NT, etc.) and the commercial activities of your company in the interests of the Ministry of Defense of the European Union (design documentation of the air defense, missile system and systems of coastal protection, drawings, presentation, video and photo (3D) materials, contract agreements and correspondence with other companies Rampini Carlo, Netcomgroup, Rafael, Thales, ST Electronics, etc.)”
At that time MBDA said they weren’t paying a ransom and that their network and infrastructure was secure. Furthermore, MBDA’s statement issued following the receipt of the note, highlighted that the company believed the data in the possession of “andrastea” was neither classified nor sensitive. Furthermore, MBDA opined that the information came from an “external drive” belonging to an Italian employee of a business partner (NFI, possibly LEONARDO who is a partner in the MBDA Missile Systems.)
MBDA’s, August 1, statement: “BDA is the subject of a blackmail attempt by a criminal group that falsely claims to have hacked the company’s information networks. Following the company’s refusal to yield to this blackmail threat and pay a ransom demand, the criminal group has spread information on the internet, making it accessible for payment. This matter is the subject of an investigation by the Italian national authorities, who MBDA is fully supporting. The company will take all possible legal actions in the face of what is a criminal act of blackmail. The origin of the data has already been ascertained, having been acquired from an external hard drive. It has been confirmed that no hacking of the company’s secure networks has occurred. So far, the company’s internal verification processes indicate that the data made available online are neither classified data nor sensitive. MBDA has state-of-the-art cyber protection systems in place to face these kinds of criminal action.”
According to BBC, approximately 80 GB was being offered for sale and that the BBC had processed a 50-megabyte sample, which in fact did contain NATO classified information (NATO SECRET – information which if disclosed would cause serious harm to NATO).  The difference between the 60 GB claimed to be in the criminal’s possession in late July and the 80 GB claimed in late-August, may be as a result of multiple compromises or, more likely, the processing of the purloined hard drive has been more completely processed.
As noted supra, NATO is concerned and is engaged in the investigation and no doubt controlling the damage the release of the data may have in the viability of various missile systems used by NATO members, including those provided to Ukraine for use in their defense against Russia’s aggression.
The investigation will ultimately confirm or refute MBDA’s attestation concerning the positive identification of the source for the information displayed by the hackers calling themselves “andrastea.” At that time a more thorough damage assessment will have to occur.
© 2022 ClearanceJobs – All rights reserved. ClearanceJobs is a DHI service.

source

Leave a Comment

Leave a Reply

Your email address will not be published.

Avoid Cyber Security Headaches With ESET Internet Security Sale – MUO – MakeUseOf

On-Demand Webinar: New CISO Survey Reveals Top Challenges for Small Cyber Security Teams – The Hacker News

Everything To Know About Student Loan Forgiveness for September 2022 – GOBankingRates

Form 424B2 Sachem Capital Corp. – StreetInsider.com