Info@NationalCyberSecurity
Info@NationalCyberSecurity

Boeing data published by Lockbit hacking gang | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


54th Paris Air Show at Le Bourget Airport near Paris

A Boeing logo is seen at the 54th International Paris Airshow at Le Bourget Airport near Paris, France, June 18, 2023. REUTERS/Benoit Tessier Acquire Licensing Rights

LONDON, Nov 10 (Reuters) – Internal data from Boeing (BA.N), one of the world’s largest defence and space contractors, was published online on Friday by Lockbit, a cybercrime gang which extorts its victims by stealing and releasing data unless a ransom is paid.

The hackers in October said they had obtained “a tremendous amount” of sensitive data from the aerospace giant and would dump it online if Boeing didn’t pay a ransom by Nov. 2.

According to a post on Lockbit’s website, the data from Boeing was published in the early hours of Friday morning. The files, which Reuters has not independently verified, mostly date to late October.

A Boeing spokesperson was unable to provide immediate comment and pointed to the company’s most recent statements on the hack. Boeing previously said it was investigating the incident, which it said did not affect flight safety.

Lockbit ransomware, first seen on Russian-language-based cybercrime forums in January 2020, has been detected all over the world, with organisations in the United States, India and Brazil among common targets, cybersecurity firm Trend Micro said last year.

It called the group “one of the most professional organised criminal gangs in the criminal underground”.

The group has hit 1,700 U.S. organisations, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

On Thursday, The Industrial and Commercial Bank of China’s (ICBC) U.S. arm was hit by a was hit by a ransomware attack that disrupted trades in the U.S. Treasury market.

Several ransomware experts and analysts said Lockbit was believed to be behind the hack, although the gang’s dark web page, where it typically posts names of its victims, did not mention ICBC.

Reporting by James Pearson; additional reporting by Tim Hepher in Paris; Editing by Kirsten Donovan and David Evans

Our Standards: The Thomson Reuters Trust Principles.

Acquire Licensing Rights, opens new tab

Reports on hacks, leaks and digital espionage in Europe. Ten years at Reuters with previous postings in Hanoi as Bureau Chief and Seoul as Korea Correspondent. Author of ‘North Korea Confidential’, a book about daily life in North Korea. Contact: 447927347451

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW