Jump to content
  • Sign Up
×
×
  • Create New...

Recommended Posts

  • Diamond Member



******** APT suspected of Ministry of Defence hack

An undisclosed advanced persistent threat (APT) actor possibly backed by the ******** government is suspected of involvement in a serious supply chain data breach

This is the hidden content, please
(MoD), but the *** has declined to formally attribute the cyber ******* stating national security concerns

The cyber *******, which was first widely reported on the evening of Monday 6 May after details of the incident were prematurely leaked, targeted MoD employees, including serving members of the armed forces and veterans, via an ******* on an as-yet unnamed payroll system supplier.

The data exposed in the ******* includes an estimated 270,000 data points, mainly names and banking details, but has not affected any other MoD systems, nor impacted the payment of salaries.

“In recent days, the Ministry of Defence has identified indications that the malign actor gained access to part of the armed forces payment network,” defence secretary Grant Shapps told the House of Commons in a statement on the afternoon of 7 May.

“This is an external system completely separate to the MoD’s network, and is not connected to the main military HR system…. It is operated by a contractor and there is evidence of potential failings by them, which may have made it easier for the malign actor to gain entry. A specialist security review of the contractor and their operations is underway and appropriate steps will be taken.

“For reasons of national security, we can’t release further details of the suspected cyber activity behind this incident. However, I can confirm to the House that we do have indications that this was the suspected work of a malign actor and we cannot rule out state involvement,” he said.

Shapps went on to outline an eight point plan of action that is already in train, with the affected systems taken offline as a precaution, an investigation including third-party experts underway, and affected personnel being informed and supported appropriately through their chain of command. This will include the provision of personal data protection services.

Shapps stressed that the number of individuals affected was low, and that there was no evidence to suggest data had been stolen.

Link to China unclear

Although no formal attribution has been made to any ******** APT, the ******** government has already moved to angrily ******* any accusations that its intelligence agencies were behind the latest incident, which comes in the wake of other large scale breaches of *** government entities and officials – such as that of the Electoral Commission – linked to China, over which multiple individuals have been sanctioned, both in the *** and US.

Speaking to Computer Weekly earlier today, former NCSC chief Ciaran Martin said that while the ******* on the MoD bore the hallmarks of nation state espionage, the possibility of a nation state’s involvement in cyber espionage was not unexpected and the *** government’s reaction sometimes risked making it hard to see the wood from the trees.

“I’m sitting in a country that for the second time in a month is getting very exercised about ******** espionage against government, once in parliament, the other now in defence, which is serious, it’s unwelcome, it’s damaging. But at the same time there’s no serious proposal anywhere that spying on governments, especially defence or foreign ministries, is beyond the pale. It is a widespread activity,” he said.

Martin explained that in terms of general public discourse, the prevailing narrative has become one of ongoing ******** cyber espionage against parliament and the government, but he pointed out that espionage long predates the digital world and is to be expected, while there are other facets to malign ******** cyber activity more worthy of urgent attention.

“We’re absolutely missing the fact that the US has warned that there is the equivalent of digital explosives

This is the hidden content, please
that can’t ***** people, but could cripple the administration of aviation, the administration of healthcare, the administration of all sorts of critical services,” said Martin. “That, to me, is a much, much more important thing to focus national effort on.”

Whatever its provenance, the incident is, however, clearly a serious supply chain breach, with lessons for all organisations.

“Cyber attacks on third-party suppliers continue to highlight the threat that vulnerabilities in the supply chain pose to *** organisations,” said Philip Tansley, a security lawyer at

This is the hidden content, please
.

“Every large organisation – including government departments – will outsource some operations to third party suppliers. This is not itself a bad thing but, as the process of outsourcing becomes increasingly complex and digitised and those suppliers outsource functions themselves, it is becoming increasingly difficult to monitor and manage the risks that a weak link in the supply chain poses.

“Proper oversight and understanding of where vulnerabilities exist by organisations is vital to enable them to manage and allocate risk appropriate and comply with contractual and regulatory obligations,” he said.





This is the hidden content, please

#******** #APT #suspected #Ministry #Defence #hack

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.