Chinese Hackers Steal Naval Warfare Secrets

Cyber attackers sponsored by the Chinese government infiltrated a US Navy contractor’s computers, allowing digital thieves to access sensitive data related to secret Navy projects on a submarine anti-ship missile. The information stolen was stored on the contractor’s unclassified network despite being highly sensitive. 
 
According to a report, 614 gigabytes of material on a closely held project known as Sea Dragon were taken. Contracted for the military organization Naval Undersea Warfare Center, Sea Dragon aims to develop a supersonic anti-ship missile for use on US submarines.
 
The contractor had been working for the Naval Undersea Warfare Center, an R&D organisation dedicated to submarines and underwater weaponry based in Newport, Rhode Island. 
 
The Chinese hackers breached the contractor's systems in January and February and made off with 614GB of data on signals, sensor data, crypto-graphic info, the Navy's electronic warfare library and material on a project known as Sea Dragon. 
 
The latter remains secretive: The only information released by the DoD is that it will integrate an existing weapon system with an existing Navy platform.
 
The data was highly sensitive despite being located on the contractor's unclassified network; When aggregated, it could be considered classified, sources told The Washington Post. The Navy is reportedly investigating the breach with help from the FBI.
 
Cmdr. Bill Speaks, Navy spokesman, confirmed that measures exist which “require companies to notify the government when a ‘cyber incident’ has occurred,” as had occurred in this instance. 
 
Experts have witnessed a recent “re-emergence” of China-based hacking groups that had seemed to have “gone dormant for a while,” said Cristiana Brafman Kittner, principal analyst at cyber-security firm FireEye. 
 
China has increasingly grown not only as an economic cyber-threat, but an online menace to national security as well.
 
Endgadget:         fifthdomain:
 
You Might Also Read:
 
US Navy Personnel Data Breached:
 
Cyber Spying All At Sea:
 
« America Can Learn About Russian Disinformation From Europe
GDPR Isn’t Enough Protection In An Age Of Smart Algorithms »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.