killnet-claim-they’ve-stolen-employee-data-from-lockheed-martin

Share news article

Share on facebook
Share on twitter
Share on linkedin
Share on email

Killnet Claim They’ve Stolen Employee Data from Lockheed Martin

The pro-Russia Killnet hacker group claims that the stolen information includes PII data such as email addresses and phone numbers of the company’s employees.

On August 1st, 2022, the pro-Russian hackers from Killnet claimed responsibility for a DDoS attack on Lockheed Martin, a United States-based global security and aerospace company. Now, Hackread.com can confirm that the Russia-linked hackers are claiming to have stolen the personal data of the company’s employees.

Killnet Hackers Claim They've Stolen Employee Data from Lockheed Martin
Screenshot shows DDoS attack claims by Killnet (Credit: Hackread.com)

This was claimed by the group on August 11th on its Telegram channel stating that it possesses PII (personally identifiable information) data of Lockheed Martin’s employees. The information apparently includes the email addresses, full names and contact numbers of hundreds of the company’s employees.

As expected, the group is threatening to share this data. The hackers also uploaded two spreadsheets with a message in the Russian language that reads:

“For those who have nothing to do, you can email Lockheed Martin Terrorists – photos and videos of the consequences of their manufactured weapons! Let them realize what they create and what they contribute to.”

Killnet’s claims on Telegram were examined by Hackread.com and the files appear to be Lockheed Martin employee names, email addresses, and phone numbers, with pictures of people – probably the employees.

Killnet Hackers Claim They've Stolen Employee Data from Lockheed Martin
Leaked data as seen by Hackread.com

However, in a not-so-clear statement, Lockheed Martin told Newsweek that the company is aware of the hacking reports but is well-prepared with necessary policies and procedures to respond to such threats.

“We remain confident in the integrity of our robust, multi-layered information systems and data security.”

Lockheed Martin

For your information, Killnet specializes in DoS and DDoS attacks. It was formed in March 2022 to retaliate against anti-Russia forces/entities. The group was previously linked to politically motivated attacks in Lithuania, Italy, Romania, the Czech Republic, Moldova, Latvia, Norway, and Eurovision 2022.

The group was also on the radar of the Anonymous hacktivist group.

On the other hand, Lockheed Martin supplies military/defense equipment to the US military and the Ukraine army. It produces a high mobility artillery rocket system that the US provides to Ukraine in its fight against the Russian invasion.

Hence, it seems probable that the pro-Russia Killnet would want to target Lockheed Martin. However, Lockheed Martin hasn’t categorically refuted claims from the group, which raises suspicion.

In conclusion, whether Killnet’s claims are authentic or phony; the company should take steps to protect its employees’ information. Employees should also be aware of the risks of their information being stolen and take precautions to protect themselves.

  1. MAZE hackers hit US Nuclear contractor; steal sensitive documents
  2. Meet SockDetour fileless backdoor targeting U.S. Defense contractors
  3. Revil ransomware gang claims to breach US nuclear weapons contractor
  4. Twilio Internal Systems Accessed as Employee Accounts Get Compromise
  5. DoppelPaymer ransomware hits SpaceX, Tesla, Boeing’s parts manufacturer

Author

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related News

How to Craft Rich Data-Driven Infographics with Powered Template

How to Craft Rich Data-Driven Infographics with Powered Template

We’re living in a data-driven world, and this means that it’s imperative to share information in the most engaging and…
Meta Fined €265 million in Facebook Data Scraping Case in the EU

Meta Fined €265 million in Facebook Data Scraping Case in the EU

Ireland’s Data Protection Commissioner (DPC) has placed yet another fine of €265 million ($277 million) on Meta following Facebook’s data…
Critical Flaw Exploited to Bypass Fortinet Products and Compromise Orgs

Critical Flaw Exploited to Bypass Fortinet Products and Compromise Orgs

While performing routine monitoring, Cyble’s Global Sensor Intelligence (GIS) discovered a threat actor is distributing unauthorized access to several Fortinet…