Attacks/Breaches

12/8/2016
03:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Data Theft At ThyssenKrupp Highlights Industrial Espionage Threat

German conglomerate confirms it was a victim of a cyberattack in which intellectual property belonging to some of its businesses was stolen.

In recent years, data breaches involving theft of financial and personal information have outnumbered cyber incidents involving theft of intellectual property and trade secrets.

But news this week of a massive data theft at German conglomerate ThyssenKrupp AG and of similar thefts at multiple major US law firms show that cyber espionage poses as critical a threat to organizations as ever.

ThyssenKrupp, best known as one of the largest steelmakers in the world, Thursday said unknown intruders apparently from southeast Asia had broken into some of its systems and stolen intellectual property belonging to some of its businesses.

In a statement, the $14 billion conglomerate identified the impacted areas as its Industrial Solutions group and Steel Europe AG.

ThyssenKrupp’s industrial solutions group employs some 19,000 people worldwide and helps build industrial plants for companies in varied industries such as chemical, oil, and mining. The 27,000-employee Steel Europe group, meanwhile, is one of the world’s leading suppliers of flat steel and accounted for some $8 billion of ThyssenKrupp’s overall revenues last year.

In the statement, ThyssenKrupp said "fragments of data," including certain project data from one of its engineering companies, had been stolen from both of the impacted businesses. But the exact nature of the data that was stolen or the extent of the theft remains unclear, it added.

Investigations show that none of ThyssenKrupp’s other operations—especially critical ones such as its ship- and submarine-building Marine Systems group and production systems handling power plants and blast furnaces—were impacted.

ThyssenKrupp’s computer emergency response team and CIOs from all business groups have been involved in the response. All affected systems have been repaired and the company has implemented around the clock monitoring of its networks for new attacks, the company said.

The data theft, especially from ThyssenKrupp’s steel business, has sparked some speculation on the threat actors behind it and their likely motives.

Robert Lee, CEO of industrial control system (ICS) security vendor Dragos Inc., via a series of Twitter posts today said the theft suggests the involvement of a large group with a full-time focus and direct industry connections. "Steel production has more trade secrets than folks realize and is very competitive," Lee tweeted. "Germany is known for having some of worlds best steel."

Andrea Carcano, founder of Nozomi Networks a company that specializes in ICS security, speculated that the threat actors might have had a multi-step attack in mind. The goal might have been to steal IP such as design and production information, and then to use it to plan a more devastating attack in future.

The ThyssenKrupp incident is the second time in recent years that a German steel manufacturer has been the victim of a cyberattack, Carcano said. In December 2014, unknown attackers disrupted operations at another German steel maker by breaking into the control systems of the mill’s blast furnace and triggering a massive fire.

It is also possible that the ThyssenKrupp attackers stole the data to improve their own business capabilities in order to better compete, or to get a look at ThyssenKrupp's plans, Carcano told Dark Reading.

The attacks also suggest the threat actors are sophisticated, he says. "This wasn’t Shamoon 2, which could have been achieved by people with low technology skills, and which occurred quickly. This attack took skill, organization and planning and it occurred over time."

Meanwhile, Fortune this week said that documents in its possession show that attackers with connections to the Chinese government were responsible for a series of data thefts from senior partners working at multiple major law firms last year.

The Wall Street Journal, which first reported the thefts in March, had identified the victims as law firms working for major US corporations. The paper had speculated that the thefts were carried out to facilitate massive insider trading.

In its report this week, Fortune said the data it has reviewed reliably shows Chinese government involvement in the data thefts.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.