Russian Hackers Successfully Targeted US Military Drone Experts With A Simple Phishing Campaign

You know the drill. An email from a strange sender shall be published in your inbox, you delete it immediately. Whatever you do, you do NOT open and you most definitely do NOT click on any ties in the send. You might think that this is common knowledge and that anyone with a modicum of Internet savvy would know this- especially anyone who might be dealing with most classified information, say armed the researchers and designers. Alas, you are wrong.

An Associated Press report, written Wednesday, been demonstrated that Russian intruders have targeted key contract employees involved in armed monotones, weapons, cloud-computing stages, and other very sensitive justification technology. This in itself is not all that surprising, but, shockingly, 40 percentage of the 87 targets will continue to be click on dodgy phishing links contained within the body of the email. Sounding on the links left the workers’ personal email chronicles and computer folders vulnerable to data theft.

As of right now, the amount of information they were able to get their hands on is undecided but it clearly conjures a good deal of questions over US cybersecurity.

“The programs that they appear to target and the people who work on those programs are some of “the worlds largest” forward-leaning, advanced technologies, ” Charles Sowell, a former major adviser to the US Office of the Director of National Intelligence, told the AP.

“[ I] f those programs are compromised in any way, then our competitive advantage and our security is compromised.”

The intruders involved in this attack are a group announced Fancy Bear. These are the same chaps who interfered in the US general elections, working for the Kremlin to steer Trump to win. This time their aim was to steal US defense mysteries, specifically those to do with drone technology.

“This would allow them to leapfrog years of hard-won know, ” explained Keven Gambold, a drone consultant and spoofing target.

Even those with a solid to better understand email 101, could descend prey to these phishing assaults when tired or amused. That’s what happened to James Poss, who is involved in monotone research for the Federal Aviation Administration. He was about to hop on a taxi to the 2015 Paris Air Show when, distracted, he sounded on the link of an incoming email created to look like a Google security alert.

“I clicked on it and instant was well known that I had been had, ” he said.

What is more strange relates to the fact that the FBI seems to have been aware of the hacking campaign for over a year. The trouble is that they’re experiencing it hard to keep up with the sheer number of cyber-attacks.

“It’s a matter of triaging to the best of our ability the publication of the objectives of the who are out there, ” explained a senior official.

[ H/ T: Associated Press]

Read more: http :// technology/ russian-hackers-successfully-targeted-us-military-drone-experts-with-a-simple-phishing-campaign /

Posted in Politics