The United States defense contractor community aren’t the only ones suffering under the yolk of cyberattacks—as seen now that Mitsubishi Heavy, Japan’s largest defense contractor, has discovered a multitude of their computers infected with viruses. Mitsubishi Heavy builds submarines, components for nuclear power stations, guided missiles, and rocket engines.
The corporation noticed the cyberattack, and its underlying viral infection, as early as August 11.
The headline of the article in Reuters suggests that this is the first cyber attack to hit Japan; however, it’s more likely that this is really just the first either detected or revealed to the public. We’ve been living in a world where cyber attacks have been possible for many years now and it’s unlikely that the Japanese defense community hasn’t seen them already.
It is the country’s biggest defense contractor, winning 215 deals worth 260 billion yen ($3.4 billion) from Japan’s Ministry of Defense in the year to last March, or nearly a quarter of the ministry’s spending that year.
Weapons included surface-to-air Patriot missiles andAIM-7 Sparrow air-to-air missiles.
Mitsubishi Heavy has also been working closely with Boeing, making wings for its 787 Dreamliner jets.
“We’ve found out that some system information such as IP addresses have been leaked and that’s creepy enough,” said a Mitsubishi Heavy spokesman. “We can’t rule out small possibilities of further information leakage but so far crucial data about our products or technologies have been kept safe.”
The viruses found in the company’s Tokoyo headquarters and satellite facilities—including Kobe Shipyard & Machinery Works, Nagasaki Shipyard & Machinery Works and Nagoya Guidance & Propulsion System Works—included Trojans that infected more than 80 of their computers. News on what information may or may not have been compromised is currently sketchy as is the nature of the Trojans unknown.
U.S. contractors have recently seen their fair share of breaches and even the Pentagon has revealed that they themselves have been targeted by hackers looking to abscond with sensitive information. Also, in the wake of the breach that hit EMC where attackers stole cryptographic keys for the SecurID system led to subsequent attempts against U.S. contractors like LockHeed Martin and Northop Grumman.
Much likeU.S.contractors and the rest of the world have seen that we live in an era of cyberwarfare.Chinaespecially has shown interest in the rest of the world and the Internet infrastructure; as a result, every country that connects with defense contractors over the Internet needs to think about their security infrastructure.
Latest posts by Kyt Dotson (see all)
- Cyberbit and ETA to develop cybersecurity training range - September 29, 2016
- Bitcoin Weekly: Japanese soon pay utilities with bitcoin, U.S. Congress ‘Blockchain caucus’, IBM open-sources blockchain for enterprise - September 28, 2016
- DroneDeploy makes image uploads quicker so users in remote areas can work faster - September 27, 2016