Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Phishing

Defense Giant General Dynamics Says Employees Targeted in Phishing Attack

General Dynamics says several benefits accounts were hacked after threat actors targeted employees in a phishing campaign.

Aerospace and defense giant General Dynamics says threat actors compromised dozens of employee benefits accounts after a successful phishing campaign targeting its personnel.

The unauthorized activity was discovered on October 10, after the attackers had accessed and made changes to the employee benefits accounts through a login portal hosted by a third party.

According to the company, the attackers ran a fraudulent advertising campaign that directed General Dynamics employees to a phishing site where they were deceived into entering their usernames and passwords.

“The malicious actor was then able to access the accounts of the employees who provided this information to the false third party login site,” General Dynamics told the Maine Attorney General’s Office. A total of 37 people were affected, the company said.

The compromised employee benefits accounts allowed the attackers to access personal information such as names, dates of birth, government-issued identification numbers, Social Security numbers, bank account information, and disability status.

General Dynamics says the attackers in some cases changed bank account information in compromised accounts. The owners of these accounts were notified starting on October 10. This week, the company started mailing written notification letters to the other impacted people.

Advertisement. Scroll to continue reading.

“Available evidence indicates that the instances of unauthorized access at issue were authenticated through the third party, and not directly through any GD business units. GD is not currently aware of any ongoing harm or risk to the affected employees as a result of this incident,” the company told the Maine AGO.

In the notification letter, a copy of which was submitted to the Maine AGO, General Dynamics tells the impacted individuals that the threat actors accessed their Fidelity NetBenefits accounts via the Employee Self Service portal using compromised credentials obtained through the phishing website.

The attackers started accessing the employee accounts on October 1 and General Dynamics suspended access to the service immediately after discovering the attack. The company is providing the affected individuals with two years of free credit monitoring.

“If you have not already done so, you should reset your login credential to your Fidelity account and not reuse the prior credentials there, or in any other accounts you use,” General Dynamics told the affected people.

Earlier this year, US-based financial services company Fidelity notified tens of thousands of individuals that their personal information was compromised in two data breaches. One affected 28,000 Fidelity Investments Life Insurance Company customers, while the other impacted more than 77,000 Fidelity Investments customers.

Related: American Addiction Centers Data Breach Impacts 422,000 People

Related: Organizations Warned of Rise in Okta Support Phishing Attacks

Related: Sophisticated Phishing Kit Used by Multiple Groups to Target Executives

Related: DocuSign Abused to Deliver Fake Invoices

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.