Boeing and Lockheed Hacker Charged and Arrested

Status
Not open for further replies.

Littlebits

Retired Staff
Thread author
May 3, 2011
3,893
- Su Bin, as photographed when entering the U.S. on June 22, 2011
China national Su Bin, has been charged, on June 27, with hacking into the systems of multiple U.S. aerospace companies that had large defense contracts, Boeing, Lockheed Martin; the next day he was arrested in British Columbia.

Su Bin is believed to have worked with other two individuals, still to be identified, to break into the systems of the targeted companies and obtain information about military projects from remote machines based in China.

The perpetrators allegedly gained access to data regarding parts and performance of the C-17 military cargo plane from Boeing and F-22 and F-35 fighter jets from Lockheed Martin.

The trio carried out their business between 2009 and 2013 and they are said to have tried to sell the illegally obtained information to state-owned Chinese companies.

Su Bin is the owner of Lode Technologies, an aviation company based in China, with an office in Canada.

According to documents unsealed in federal court in Los Angeles, Su Bin’s co-conspirators managed to exfiltrate 630,000 files relating to Boeing’s C-17 project, totalling 65GB.

Infecting the machines on Boeing and Lockheed networks was done through phishing by the two unnamed hackers, which operated from China. Once the malicious file was executed, it would contact a remote server for commands and instructions.

The court document says that the infected machines were accessed through the remote desktop protocol (RDP) and the intruders could explore the network.

Furthermore, the attackers had persistent presence on the compromised system and could escalate their privileges as well as reach secure parts of the network. The collected data would be compressed in RAR archives and sent to computers under their control.

Surveillance of military technology seems to be the main task of the other two members of the group, named UC1 and UC2 in the court documents.

Law enforcement agencies managed to find an email with a document attached that was in fact a report identifying targets, objectives, and the success of computer intrusions to U.S. companies

It also noted that entities with military technology information in Taiwan and files from different groups in China, such as the Democracy Movement and the Tibetan Independence Movement, were also targeted.

Based on the unsealed document, UC1 and UC2 exchanged information about 32 U.S. military projects, with details about the amount of data that was stolen.

Su Bin is to remain in custody in Canada waiting a bail hearing scheduled for July 18 in Vancouver, B.C.

Source
 

Cowpipe

Level 16
Verified
Well-known
Jun 16, 2014
781
Phishing - The easy way for anyone, to access everything.

High profile twitter accounts hacked. Aviation industry computers hacked. Government computers hacked. What used to be done with scripts and weak password exploitation can now be done in half the time with a tenth of the effort, thanks to phishing.
 
D

Deleted member 178

if you knew how much sensitive infos i got just by pretending to be a hot nympho girl (fake facebook, twitter account with photoshoped pictures of a sex bomb) :D
 
  • Like
Reactions: marg and Cowpipe
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top