Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

European Missile Maker MBDA Denies Hackers Breached Systems

European missile maker MBDA has denied that its systems have been breached after cybercriminals offered to sell data allegedly stolen from the company’s systems.

European missile maker MBDA has denied that its systems have been breached after cybercriminals offered to sell data allegedly stolen from the company’s systems.

A joint venture between aerospace and defense giants Airbus, BAE Systems and Leonardo, MBDA is a European group that designs and produces missiles and missile systems. The company provides its products to air, sea and land forces in Spain, Italy, France, the UK, the US, and Germany.

In late July, a threat actor calling itself ‘Adrastea’ and describing itself as ‘a group of independent specialists and researchers in the field of cybersecurity’ claimed on several cybercrime forums that it had exploited critical vulnerabilities in MBDA systems and gained access to the company’s files.

The cybercriminals claimed to have obtained roughly 60 Gb of data, including files describing military projects, as well as information related to commercial activities, such as design documentation, multimedia materials, contracts, and messages exchanged with other companies. The files have been up for sale. 

On August 1, MBDA issued a statement in several languages, confirming that files have been stolen, but denying that its systems have been breached by hackers.

“MBDA is the subject of a blackmail attempt by a criminal group that falsely claims to have hacked the company’s information networks. Following the company’s refusal to yield to this blackmail threat and pay a ransom demand, the criminal group has spread information on the internet, making it accessible for a payment,” the missile maker said in its statement.

The company has contacted Italian authorities and says it plans on taking ‘all possible legal action’ against the perpetrators.

MBDA claims that its secure networks have not been hacked. Instead, the attackers allegedly obtained the data from an external hard drive. The company’s investigation is ongoing, but it currently claims that the data made available by the hackers does not appear to be classified or sensitive.

Advertisement. Scroll to continue reading.

It’s unclear how the data from an external drive became compromised. It’s possible the attackers gained access to an employee’s personal device, to which the drive was connected at some point, or they may have acquired the actual drive somehow. Studies have shown that secondhand storage drives often contain the previous owner’s data.

SecurityWeek has reached out to MBDA for clarifications, but the company said it cannot share any information while the official investigation is underway. 

Related: Defense Contractors Must do More to Conceal Their Attack Surface

Related: German Auto and Defense Firm Rheinmetall Says Malware Hit Several Plants

Related: Sophisticated Threat Actor Targets Governments, Defense Industry in Western Asia

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

Cloud security firm Mitiga has appointed Charlie Thomas as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.