Lockheed Martin Corporation and Other U.S. Military Contractors Attacked by Cyber Criminals - Page 2
Classified information is likely out of hackers' hands and not compromised because due to the volume of attacks that these kinds of systems receive on a daily basis, it's highly doubtful that Lockheed Martin, or any security contractor, would keep classified information within reach, should one ever breach the remote access servers. In the original Reuters news article, it is mentioned that “Defense contractors' networks contain sensitive data on sophisticated weapons systems, but all classified information is kept on separate, closed networks managed by the U.S. government, said a former senior defense official, who was not authorized to speak on the record.” Lets us hope that this Reuters source is correct.
In March, when it was hacked, RSA must have alerted its customers, including Lockheed Martin. The question arises as to why the cyber criminals attacked Lockheed Martin, knowing that all sources of detection and prevention devices where in place? If the attack was to prove that they are bright and capable of hacking the number one player in the US Defense Industry, they have proved their point to a certain degree. Since we are not talking about the World of Warcraft key fobs or the “Who removed you on Twitter” hack, but talking about the big leagues in cyber crime and in national defense.
Lockheed Martin said in a statement Saturday May 28, that the attack was detected May 21 "almost immediately" and that they implemented countermeasures. The statement says that "As a result, our systems remain secure; no customer, program or employee personal data has been compromised." Even if you had had a duplicate SecurID number generator, you would still need the username and securid password associated with the account to get into the network, that information is kept by each individual contractor. Hopefully, the thieves where stopped at this point and did not go further.