News Tech: Killnet, according to Newsweek, also threatened to divulge the employee data it claimed to have acquired from Lockheed Martin.
A pro-Russian organisation known as Killnet specialises in DoS and DDoS attacks. It is believed to have been established in March 2022, and its main goal is to exact revenge on Russia’s alleged adversaries. It is thought to be behind assaults with political motivation in the Czech Republic, Italy, Lithuania, Latvia, Romania, Moldova, and the Czech Republic.
Lockheed Martin has not commented on the alleged attack beyond informing Newsweek that it is “aware of the reports” and “has policies and procedures in place to mitigate cyber threats to our business.” The company also stated that it “remains confident in the integrity of our robust, multi-layered information systems and data security.”
A pro-Russian organisation known as Killnet specialises in DoS and DDoS attacks. It is believed to have been established in March 2022, and its main goal is to exact revenge on Russia’s alleged adversaries. In addition to Eurovision 2022, it is suspected of being behind politically motivated assaults in Romania, Moldova, the Czech Republic, Italy, Lithuania, Norway, and Latvia.
An analyst for threat intelligence at Searchlight Security named Louise Ferrett has watched the video. “What looks to be Lockheed Martin employee names, email addresses, and phone numbers, with photographs of persons – presumably the employees – overlay,” she claimed, was included in it.
Additionally, Killnet posted two spreadsheets with the following message: “For those with nothing to do, you can email Lockheed Martin Terrorists – images and videos of the results of their produced weaponry! Let them understand their contributions and what they produce. Ferret, though, is not persuaded. Cross-referencing a sample of the data revealed that they appeared to be or had been actual Lockheed personnel, but she said that this did not prove that the organisation had been compromised. To weaken the corporation and frighten its employees, for instance, this could be a rehash of outdated or open source material.
On the one hand, Lockheed Martin hasn’t mentioned an attack or a breach at all. But neither way that shows anything. However, Killnet has not presented indisputable proof of data exfiltration, which once more is irrelevant. Without a response from Lockheed Martin or evidence from Killnet, it is more likely that this was a pro-Russian hacking group’s publicity stunt than a successful assault on Lockheed Martin. SecurityWeek has contacted the HIMARS manufacturer regarding the most recent claims made by Killnet, and we will include any comments we get.
Check the latest news about tech news section for best information.