Killnet Turn Their Attention To Lockheed Martin

The Killnet Russian hacking group claims it has launched the sophisticated cyber attack on arms supplier Lockheed Martin, saying that this is the start of a ‘new level attack.’ From the message released by the hackers, it appears that the attack against the US defence manufacturer began in early August.

Killnet are a powerful state-sponsored group connected with the recent attacks on Lithuanian government agencies.

In this incident, the objective of the attack is the supply of Lockheed Martin's advanced M142 High Mobility Artillery Rocket System (HIMARS), supplied to the Ukrainian army and being used to devastating effect against Russian military targets in Russian- occupied Donetsk and Crimea. Hackers infiltrated Lockheed Martin with the intention of interrupting the supply of HIMARS.

In a statement reported by Life magazine, Killnet describe Lockheed Martin as "the actual sponsor of world terrorism... responsible for thousands of deaths... The notorious HIMARS multiple launch rocket systems, supplied to Ukraine by the aforementioned military-industrial corporation, allow the criminal authorities of the Kiev regime to kill civilians, destroy the infrastructure and social facilities of the still temporarily occupied Ukraine." 

Each HIMARS can carry six GPS-guided missiles that can be reloaded in about a minute with a small team consisting of only a driver, gunner and launcher section chief. The range of the weapons is 80km (50 miles), almost double the ranger of M777 howitzers, another Western-made weapon that Ukraine has been using against Russian forces since May.

Killnet,is known for their Distributed Denial of Service (DDoS) and other attacks on government institutions and private companies since the commencement of Russia’s Ukraine invasion.  In this case the attack is thought to be an attempted network infiltration aimed at causing damage, rather than the temporary disruption associated with DDos. 

The hackers, in both the DoS and DDoS attacks, flood the servers of a given platform, service or website, with traffic to shut down the servers. The intense DDoS attack on Lithuanian government institutions and companies was carried out in retaliation for the blockade that Lithuania imposed on the transit of EU-sanctioned Russia goods like steel and iron ore to the Russian Baltic enclave of Kaliningrad. 

Lockheed Martin:    Eurasian Times:    The Tech Outlook:    Newsweek:    DIHK:    Cybersecurity Insiders:  

RealClearDefense:    Caliber:    Cybersecurity Review:     Sundries:    The Record:    Image: Lockheed Martin

You Might Also Read: 

Russia Escalates Spying On Ukraine’s Allies:

 

« CISA & ACSC Name 2021’s Top Malware
Blockchain Auditors Say $4m Crypto Theft Enabled By Logging Tech »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Voyager Networks

Voyager Networks

Voyager Networks is an IT solutions business with a focus on Enterprise Networks, Security and Collaborative Communications.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Cyber Force

Cyber Force

Cyber Force provide a range of cyber security services including Consultancy & Advisory, Security Assessments, Compliance, Managed Security Services, Training & Certification.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

Burning Glass Technologies

Burning Glass Technologies

Burning Glass Technologies is an analytics software company that provides real-time data on job growth, skills in demand, and labor market trends.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.