Nuclear Missile Contractor Hacked

Hackers have stolen confidential documents from a US military contractor which provides critical support for the country's Minuteman III nuclear deterrent. The National Security Agency (NSA) has warned of Russian military hackers actively exploiting a popular email program to infiltrate computer systems within the United States. 

Spies from countries around the world are fighting a silent, dirty war to get in position in civilian infrastructure, like electricity generating civilian nuclear plants, to be able to commit sabotage during a moment of geopolitical tension.

The Russian military hacking group, Sandworm Team, operates as part of the Russian military intelligence agency (GRU).Sandworm has been in operation for more than a decade and has carried out sophisticated cyber-attacks against governments, telecommunications, and energy sectors in Ukraine, Poland, the EU and NATO. 

Cyber criminals were able to gain unauthorised access to the computer network of New Mexico company Westech International.  Westech provides critical support for the United States' Minuteman III nuclear deterrent, the intercontinental ballistic missile LGM-30G Minuteman III is a three-stage missile with a range of over 6,000 miles. 

The attack is believed to have been carried out by the threat group MAZE, which has previously claimed to have attacked Minnesota egg supplier Sparboe Companies with ransomware.  

After gaining access to Westech International's computer network, the criminals encrypted the company's machines and began to leak documents online to pressure the company to pay extortion. It is unclear if the documents stolen by the criminals include military classified information, but files which have already been leaked online suggest the hackers had access to extremely sensitive data, including payroll and emails.

The files stolen from Westech in the cyber-attack have been leaked online. The files appear to contain sensitive data, including company emails, payroll, and what has been described in some reports as "personal information." 
Westech confirmed that the company had been hacked and that its computers had been encrypted. No information was shared regarding when the attack took place or how the criminals gained entry to Westech's computer system.

The access of US systems by Russian hackers is more significant, especially during the forthcoming US Presidential  elections where there have neen warning of the likely repeat of hackers allegedly influencing the outcome of the presidential election in 2016 is already emerging.   

Westech International:      Infosecurity Magazine:       Sky News:       CPO Magazine:      CSO Online

You Might Also Read: 

The Destabilizing Danger Of Cyberattacks On Missile Systems:

 

« Google Faces Lawsuit For Tracking Users In Privacy Mode
The British Army Has A New Cyberwar Regiment »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

Trustmi

Trustmi

Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7.