SecureWorld News

3 Things to Know About the Hack on Navy 'Undersea Warfare' Contractor

Written by SecureWorld News Team | Mon | Jun 11, 2018 | 1:15 PM Z

The Washington Post broke a frightening story over the weekend about a military contractor which supports the U.S. Naval Undersea Warfare Center.

Then other news sources followed up on the news and came across some real nuggets. Here is what you need to know.

3 facts about Navy undersea warfare data hack

  1. The Washington Post reports that hackers took 614 gigabytes of material linked to undersea warfare—including secret Navy plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020. For some reason, the data was "being housed on the contractor’s unclassified network."
  2. Sources told the Post "Chinese government hackers" were behind the intellectual property theft.
  3. Reuters reached out to the Chinese Embassy for comment, and guess what? The Chinese didn't do it! The Embassy told Reuters that the Chinese government, “Staunchly upholds cybersecurity, firmly opposes and combats all forms of cyber attacks in accordance with law.”

If the Chinese are combating all forms of cyber attacks, then somebody better let the former Director of Operations for U.S. Cyber Command know about it. We interviewed him at SecureWorld Detroit.

Lt. General (Ret.) Brett Williams, who co-founded IronNet Cybersecurity, talked to SecureWorld about the hacking behavior of China, Russia, and North Korea.