. Military Space News .
CYBER WARS
Hackers target Airbus suppliers in quest for commercial secrets
By Daphne BENOIT, Fabien ZAMORA, Laurent BARTHELEMY and Mathieu RABECHAULT
Paris (AFP) Sept 26, 2019

European aerospace giant Airbus has been hit by a series of attacks by hackers targeting its suppliers in search of commercial secrets, sources told AFP, adding they suspected a Chinese link.

AFP spoke to seven security and industry sources, all of whom confirmed a spate of attacks in the past 12 months but asked for anonymity because of the sensitive nature of the information they were sharing.

Two security sources involved in investigating the hacking said there had been four major attacks.

Airbus has long been considered a tempting target because of the cutting-edge technologies that have made it one of the world's biggest commercial plane manufacturers, as well as a strategic military supplier.

In January, it admitted to a security incident that "resulted in unauthorised access to data", but people with knowledge of the attacks outlined a concerted and far bigger operation over the last year.

AFP's sources said the hackers targeted British engine-maker Rolls-Royce and the French technology consultancy and supplier Expleo, as well as two other French contractors working for Airbus that AFP was unable to identify.

Airbus did not immediately reply to a request for comment.

A spokesperson for Rolls-Royce declined to comment on the specifics of any attack but said: "We have experience of attempts to gain access to our network and we have a team of experts who work closely with the relevant authorities to ensure that we combat these attempts and minimise any potential impact."

Expleo said it would neither "confirm nor deny" that it had been targeted.

Romain Bottan of the aerospace security specialist BoostAerospace said that hackers were always looking for weak links.

"Very large companies are very well protected, it's hard to pirate them, so smaller companies are a better target," he said.

- VPN entry point -

The attack against Expleo was discovered at the end of last year but the group's system had been compromised long before, one of the sources told AFP on condition of anonymity.

"It was very sophisticated and targeted the VPN which connected the company to Airbus," the source said.

A VPN, or virtual private network, is an encrypted network that enables employees to access company systems remotely.

Airbus suppliers sometimes operate in a VPN linking them with colleagues at the plane-maker.

The other attacks used the same methods, with the first of them detected at a British subsidiary of Expleo, formerly known as Assystem, as well as Rolls-Royce, which provides engines for Airbus planes.

According to several of the sources, the hackers appeared to be interested in technical documents linked to the certification process for different parts of Airbus aircraft.

They also said that several stolen documents were related to the innovative turbo-prop engines used on the Airbus military transport plane A400M.

One of the sources said the hackers were also interested in the propulsion systems for the Airbus A350 passenger jet, as well as its avionics systems controlling the plane.

- Who to blame? -

None of the sources who spoke to AFP could formally identify the perpetrators of the attacks, pointing to the extreme difficulty in obtaining evidence and identification.

Many state-backed and independent hackers are known to disguise their tracks, or they may leave clues intended to confuse investigators or lead them to blame someone else.

But the sources said they suspected Chinese hackers were responsible, given their record of trying to steal sensitive commercial information and the fact that Beijing has just launched a plane designed to compete with Airbus and US rival Boeing.

State-owned plane-maker Comac has already launched manufacturing of its first mid-range airliner but has struggled to get it certified.

Engines and avionics are "areas in which Chinese research and development is weak," one of the sources said.

In its quest to break the stranglehold of Airbus and Boeing on the global aircraft market, Beijing also has ambitions to build a long-haul jet called the C929, which will be developed in partnership with Russia.

Several sources said they believed a group of hackers linked to the Chinese Communist Party, known as APT10, could be behind the attacks.

The United States considers APT10 to be state-backed hackers linked to the Chinese intelligence services and military.

But another source pointed to another group of Chinese hackers known as JSSD, which are believed to operate under the regional security ministry in the coastal province of Jiangsu.

"The JSSD is focused on the aerospace industry," one source said, explaining that they employ people "familiar with the language, the software and aerospace codes."

In October 2018, the US Justice department named several JSSD officers as being responsible for a hacking operation targeting an engine being developed by US-based General Electric and French aerospace group Safran.

"At the time of the intrusions, a Chinese state-owned aerospace company was working to develop a comparable engine for use in commercial aircraft manufactured in China and elsewhere," a US statement said.

France and Airbus have been left in a delicate position by the discovery of the hacking attacks, sources told AFP, with the country and company needing to take into account their commercial ties with China.

- Achilles' heel -

The attacks show up the vulnerability of Airbus to intrusions via its global supplier network, and the value of its technology to foreign countries.

"The aerospace sector is the one that suffers most from cyberattacks, mostly through spying or people seeking to make money from this industry," said Bottan of BoostAerospace.

There is also a major industrial risk for Airbus, with hackers potentially able to knock out production for strategic suppliers which would have a knock-on effect on production.

"If someone wanted to slow down production, they can quickly identify the critical supplier, the single sources, which are unique in their role," one expert said.

Belgian aerospace design and manufacturing firm ASCO had an IT meltdown earlier this year caused by malware, and it took a month to restore its systems, one source said.

That incident hit Airbus production.

fz-dab-lby-mra-pta-map/adp-cb/

AIRBUS GROUP

ASSYSTEM

BOEING

GENERAL ELECTRIC

SAFRAN

ROLLS-ROYCE HOLDINGS


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Czech intelligence blames China for major cyber attack
Prague (AFP) Sept 25, 2019
China was behind a major cyber attack at a key government institution in the Czech Republic last year, the EU member's intelligence agency said in a report Wednesday. Without providing details, the agency known as NUKIB said the attack "was almost certainly carried out by a state actor or a related group," with "a Chinese actor" the most likely suspect. More broadly speaking, China and Russia pose the biggest threat to cybersecurity in the Czech Republic, the intelligence agency said in its 2018 ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Developer hints at start date for mass production of Russia's S-500 missile system

Russia deploys S-400 missiles in Arctic; Offers Saudi ABM systems

Lockheed nabs $50.3M Navy contract for Aegis system upgrades

Raytheon nabs $10.8M contract to support Kuwait's Patriot missiles

CYBER WARS
State Dept. approves sale of laser aircraft defense system to Qatar

$11.4M Boeing contract calls for SLAM-ER missile development for Saudi Arabia

Raytheon awarded $25.4M for Tomahawk Weapons Systems Military Code, AGR5 kit

Navy taps Raytheon for Tomahawk missile support on $7.2M contract

CYBER WARS
FedEx, Walgreens team with Wing for drone delivery test

U.S. Navy's MQ-25 tanker drone completes first test flight

Lockheed, Raytheon launch Javelin missiles from unmanned vehicle

Iran unveils new reconnaissance and attack drone

CYBER WARS
DARPA announces final teams for Spectrum Collaboration Challenge Championship event

Eight companies share Navy's $968.1M C4ISR contract

US Air Force selects Hughes to strengthen SATCOM resilience

New FlexGround Service Delivers High-Speed Broadband to Forces in Remote Areas

CYBER WARS
China anniversary parade to unveil hi-tech military gear: report

New vibration sensor detects buried objects from moving vehicle

T-Worx, Army develop weaponry to equip soldiers with artificial intelligence, real-time integrated data

Estonia, five other nations to build unmanned military ground vehicle

CYBER WARS
Colt to stop making AR-15 rifles, weapon of choice in US mass shootings

Airbus irked by Spain's choice of fighter jet partner

EU defence funding way too small for big ambitions: report

Senate committee approves secretary nominees for Air Force, Navy

CYBER WARS
China rejects Trump's 'untrue' remarks on Hong Kong, trade

US pressures China on Hong Kong, Uighurs and trade

China denies 'flexing muscles' in military parade

Trump addresses UN in shadow of Iran crisis, domestic scandal

CYBER WARS
Scientists create a nanomaterial that is both twisted and untwisted at the same time

Physicists create world's smallest engine

DNA origami joins forces with molecular motors to build nanoscale machines

DARPA Announces Microsystems Exploration Program









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.