On Friday, Lockbit—a cybercrime group that demands ransom payments in exchange for data theft and release—published online internal data from Boeing, one of the biggest defence and space companies in the world.
In October, the hackers declared that they had amassed "a tremendous amount" of private information from the massive aerospace company and threatened to post it online unless Boeing paid a ransom by November 2.
The information from Boeing was released early on Friday morning, per a post on Lockbit's website. The majority of the files, which Reuters has not independently confirmed, are from late October.
Boeing acknowledged in a statement that there had been a cybersecurity incident affecting "elements" of the company's parts and distribution division.
“We are aware that, in connection with this incident, a criminal ransomware actor has released information it alleges to have taken from our systems," Boeing said. "We continue to investigate the incident and will remain in contact with law enforcement, regulatory authorities, and potentially impacted parties, as appropriate."
Although the business declined to comment on whether Lockbit had gained defence or other sensitive material, it stated that it "remains confident" that the incident did not endanger aircraft or flight safety.
The malware known as Lockbit, which was initially discovered in January 2020 on forums dedicated to cybercrime in Russian, has been found worldwide. According to cybersecurity company Trend Micro, common targets of the ransomware include US, Indian, and Brazilian businesses.
It described them as "one of the most professional organised criminal gangs in the criminal underground" .
According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the group has targeted 1,700 U.S. organisations.
Trades in the US Treasury market were halted on Thursday due to a ransomware attack that targeted the US branch of the Industrial and Commercial Bank of China (ICBC).
Lockbit is thought to have been responsible for the hack, according to a number of ransomware experts and analysts, despite the fact that ICBC was not mentioned on the gang's dark web domain, where it usually displays the names of its victims.
(Source:www.theprint.in)
In October, the hackers declared that they had amassed "a tremendous amount" of private information from the massive aerospace company and threatened to post it online unless Boeing paid a ransom by November 2.
The information from Boeing was released early on Friday morning, per a post on Lockbit's website. The majority of the files, which Reuters has not independently confirmed, are from late October.
Boeing acknowledged in a statement that there had been a cybersecurity incident affecting "elements" of the company's parts and distribution division.
“We are aware that, in connection with this incident, a criminal ransomware actor has released information it alleges to have taken from our systems," Boeing said. "We continue to investigate the incident and will remain in contact with law enforcement, regulatory authorities, and potentially impacted parties, as appropriate."
Although the business declined to comment on whether Lockbit had gained defence or other sensitive material, it stated that it "remains confident" that the incident did not endanger aircraft or flight safety.
The malware known as Lockbit, which was initially discovered in January 2020 on forums dedicated to cybercrime in Russian, has been found worldwide. According to cybersecurity company Trend Micro, common targets of the ransomware include US, Indian, and Brazilian businesses.
It described them as "one of the most professional organised criminal gangs in the criminal underground" .
According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the group has targeted 1,700 U.S. organisations.
Trades in the US Treasury market were halted on Thursday due to a ransomware attack that targeted the US branch of the Industrial and Commercial Bank of China (ICBC).
Lockbit is thought to have been responsible for the hack, according to a number of ransomware experts and analysts, despite the fact that ICBC was not mentioned on the gang's dark web domain, where it usually displays the names of its victims.
(Source:www.theprint.in)