Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/29/2013
06:26 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Chinese Cyberspies Access U.S. Military Weapons System Designs

Confidential report to DoD officials reveals breadth -- and reality -- of Chinese cyberespionage operations against U.S. military interests

Chinese hackers reportedly have gained access to the designs for more than 24 U.S. weapons systems, including missile systems, combat aircraft, and ships, in a breach that could dramatically boost Chinese weapon systems and dilute the U.S.'s military edge over China.

A confidential report by the Defense Science Board on behalf of U.S. military officials listed specific U.S. weapon systems designs that had been compromised by the Chinese cyberespionage actors, including the advanced Patriot missile system (PAC-3), Terminal High Altitude Area Defense systems for shooting down ballistic misses, the Aegis ballistic-missile defense system, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter, the Littoral Combat ship, and the F-35 Joint Strike Fighter, according to The Washington Post, which first broke the story.

The Defense Science Board report neither specifies the time frame for the breaches nor whether the Chinese hackers got the information via U.S. government networks or defense contractors or subcontractors, according to The Post. A public version of the report published in January said the U.S. is not prepared for cyberwar and called out the "consequences" of escalating cyberespionage against the nation.

Chinese government officials have consistently denied executing cyberespionage campaigns against the U.S. government and companies here. But President Obama is likely to discuss the issue with Chinese President Xi Jiping in their upcoming meeting in California, according to The Post.

Cyberespionage by China against U.S. government and commercial entities has been an ongoing problem and is not likely to go away anytime soon, even as the U.S. increases pressure on China.

"While it is not new that Chinese hackers have penetrated a number of companies and government agencies, this news is indicative of the types of information which has probably been gleaned from those penetrations," says Ken Silva, senior vice president of cybersecurity, ManTech International. "At ManTech/HBGary, we have seen the theft of information from commercial and government organization for many years. But this incident is a clear example of the national security implications of such breaches. It is increasingly more evident that defensive measures don't always work, and organizations need to assume there has been, or will be a breach and put the proper tools and procedures in place to detect and deal with it quickly."

James C. Foster, CEO and founder of Riskive, says this is an example of the new normal. "There will never be any country taking credit for this type of attack. Nation states will never raise their hands and say, 'I am responsible for this attack,'" Foster says. "In the world of cyberconfrontation, we've entered a new realm of 'deniable warfare.' It's an era of no one owning accountability -- and its going to take a new way of thinking and threat management to do something about this type of cyberwarfare."

The report on the weapon systems design breaches demonstrates how the DoD's efforts to quell cyberespionage have failed, security experts say. "The attacks are obviously a concern, but the bigger issue is the ineffectiveness of the efforts thus far. In the report, the DoD says their 'numerous' efforts are fragmented and unaligned. As a result, they've declared that they are not prepared to defend against this threat," says Dwayne Melancon, chief technology officer for Tripwire.

Melancon says the report's finding that "it will take years for the department to build an effective response" basically means the DoD's cyberdefenses aren't cutting it. "The only way to interpret this statement is that DoD’s approach to cybersecurity is fundamentally broken," he says.

The Post's full list of the compromised weapons is here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
New FISMA Report Shows Progress, Gaps in Federal Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13139
PUBLISHED: 2019-08-22
In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the ...
CVE-2019-15325
PUBLISHED: 2019-08-22
In GalliumOS 3.0, CONFIG_SECURITY_YAMA is disabled but /etc/sysctl.d/10-ptrace.conf tries to set /proc/sys/kernel/yama/ptrace_scope to 1, which might increase risk because of the appearance that a protection mechanism is present when actually it is not.
CVE-2019-15326
PUBLISHED: 2019-08-22
The import-users-from-csv-with-meta plugin before 1.14.2.1 for WordPress has directory traversal.
CVE-2019-15327
PUBLISHED: 2019-08-22
The import-users-from-csv-with-meta plugin before 1.14.1.3 for WordPress has XSS via imported data.
CVE-2019-15328
PUBLISHED: 2019-08-22
The import-users-from-csv-with-meta plugin before 1.14.0.3 for WordPress has XSS.