The professional-Russia Killnet hacker group claims that the stolen info contains PII information resembling electronic mail addresses and cellphone numbers of the corporateās staff.
On August 1st, 2022, the pro-Russian hackers from Killnet claimed duty for a DDoS assault on Lockheed Martin, a United States-based world safety and aerospace firm. Now, Hackread.com can affirm that the Russia-linked hackers are claiming to have stolen the non-public information of the corporateās staff.
This was claimed by the group on August eleventh on its Telegram channel stating that it possesses PII (personally identifiable info) information of Lockheed Martinās staff. The knowledge apparently contains the e-mail addresses, full names and phone numbers of a whole bunch of the corporateās staff.
As anticipated, the group is threatening to share this information. The hackers additionally uploaded two spreadsheets with a message within the Russian language that reads:
āFor many who don’t have anything to do, you may electronic mail Lockheed Martin Terrorists ā pictures and movies of the results of their manufactured weapons! Allow them to notice what they create and what they contribute to.ā
Killnetās claims on Telegram have been examined by Hackread.com and the recordsdata look like Lockheed Martin worker names, electronic mail addresses, and cellphone numbers, with photos of individuals ā most likely the staff.
Nevertheless, in a not-so-clear assertion, Lockheed Martin instructed Newsweek that the corporate is conscious of the hacking studies however is well-prepared with needed insurance policies and procedures to answer such threats.
āWe stay assured within the integrity of our strong, multi-layered info methods and information safety.ā
Lockheed Martin
To your info, Killnet focuses on DoS and DDoS assaults. It was shaped in March 2022 to retaliate towards anti-Russia forces/entities. The group was beforehand linked to politically motivated assaults in Lithuania, Italy, Romania, the Czech Republic, Moldova, Latvia, Norway, and Eurovision 2022.
The group was additionally on the radar of the Nameless hacktivist group.
Then again, Lockheed Martin provides army/protection tools to the US army and the Ukraine military. It produces a excessive mobility artillery rocket system that the US gives to Ukraine in its battle towards the Russian invasion.
Therefore, it appears possible that the pro-Russia Killnet would wish to goal Lockheed Martin. Nevertheless, Lockheed Martin hasnāt categorically refuted claims from the group, which raises suspicion.
In conclusion, whether or not Killnetās claims are genuine or phony; the corporate ought to take steps to guard its staffā info. Workers also needs to pay attention to the dangers of their info being stolen and take precautions to guard themselves.
Learn Associated Information
- MAZE hackers hit US Nuclear contractor; steal delicate paperwork
- Meet SockDetour fileless backdoor concentrating on U.S. Protection contractors
- Revil ransomware gang claims to breach US nuclear weapons contractor
- Twilio Inner Techniques Accessed as Worker Accounts Get Compromise
- DoppelPaymer ransomware hits SpaceX, Tesla, Boeingās elements producer