Chinese Hackers Steal Naval Warfare Secrets

Cyber attackers sponsored by the Chinese government infiltrated a US Navy contractor’s computers, allowing digital thieves to access sensitive data related to secret Navy projects on a submarine anti-ship missile. The information stolen was stored on the contractor’s unclassified network despite being highly sensitive. 
 
According to a report, 614 gigabytes of material on a closely held project known as Sea Dragon were taken. Contracted for the military organization Naval Undersea Warfare Center, Sea Dragon aims to develop a supersonic anti-ship missile for use on US submarines.
 
The contractor had been working for the Naval Undersea Warfare Center, an R&D organisation dedicated to submarines and underwater weaponry based in Newport, Rhode Island. 
 
The Chinese hackers breached the contractor's systems in January and February and made off with 614GB of data on signals, sensor data, crypto-graphic info, the Navy's electronic warfare library and material on a project known as Sea Dragon. 
 
The latter remains secretive: The only information released by the DoD is that it will integrate an existing weapon system with an existing Navy platform.
 
The data was highly sensitive despite being located on the contractor's unclassified network; When aggregated, it could be considered classified, sources told The Washington Post. The Navy is reportedly investigating the breach with help from the FBI.
 
Cmdr. Bill Speaks, Navy spokesman, confirmed that measures exist which “require companies to notify the government when a ‘cyber incident’ has occurred,” as had occurred in this instance. 
 
Experts have witnessed a recent “re-emergence” of China-based hacking groups that had seemed to have “gone dormant for a while,” said Cristiana Brafman Kittner, principal analyst at cyber-security firm FireEye. 
 
China has increasingly grown not only as an economic cyber-threat, but an online menace to national security as well.
 
Endgadget:         fifthdomain:
 
You Might Also Read:
 
US Navy Personnel Data Breached:
 
Cyber Spying All At Sea:
 
« America Can Learn About Russian Disinformation From Europe
GDPR Isn’t Enough Protection In An Age Of Smart Algorithms »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.