LOGO
General Discussion Undecided where to post - do it here.

Reply to Thread New Thread
Old 05-28-2011, 04:48 PM   #1
Uplillacype

Join Date
Oct 2005
Posts
492
Senior Member
Default Lockheed Martin got pwned
http://www.nytimes.com/2011/05/28/bu...hack.html?_r=1

Doesn`t sound to bad, does it?


http://www.cringely.com/2011/05/inse...-more-secrets/

Late on Sunday all remote access to the internal corporate network was disabled. All workers were told was that it would be down for at least a week. Folks who regularly telecommute were asked to come into nearby offices to work. Then earlier today (Wednesday) came word that everybody with RSA SecureID tokens would be getting new tokens over the next several weeks. Also, everybody on the network (over 100,000 people) would be asked to reset their passwords, which means admin files have probably been compromised.
Uplillacype is offline


Old 05-28-2011, 04:55 PM   #2
iceleliewBync

Join Date
Nov 2005
Posts
605
Senior Member
Default
Well, Lockheed Martin Owns the American Tax Payers.

Hard.

http://www.spacex.com/
iceleliewBync is offline


Old 05-28-2011, 05:17 PM   #3
DJElizardo

Join Date
Oct 2005
Posts
456
Senior Member
Default
un-SecurID... ouch
DJElizardo is offline


Old 05-28-2011, 09:12 PM   #4
Dfvgthyju

Join Date
Oct 2005
Posts
548
Senior Member
Default
Odds that it was a Chinese sponsored attack?
Dfvgthyju is offline


Old 05-29-2011, 08:39 PM   #5
pavilionnotebook

Join Date
Oct 2005
Posts
527
Senior Member
Default
un-SecurID... ouch
Indeed... Pretty much all of our clients have been switched away from them, beginning with the initial RSA breach.

RSA had the option to fully disclose the extent of their breach, but instead they chose to keep the vast majority of their customers in the dark. Now, if they don't pony up the information fast they'll have a mass exodus of their customers to other two-factor solutions.

As for saying the password change meant a compromise of Lockheed's admin files, that's not necessarily true. It's a standard security operating procedure in most enterprise to force password changes @ the next login; some even go so far as automatically resetting all of the passwords and requiring employees to contact their support services to get them changed.

Odds that it was a Chinese sponsored attack?
Extremely high.
pavilionnotebook is offline


Old 05-30-2011, 01:11 AM   #6
Wahwlsnt

Join Date
Oct 2005
Posts
412
Senior Member
Default
http://www.reuters.com/article/2011/...74S09220110529

"As a result of the swift and deliberate actions taken to protect the network and increase IT security, our systems remain secure," Jennifer Whitlow, a Lockheed spokeswoman, said in an e-mailed statement. "No customer, program or employee personal data has been compromised."
Wahwlsnt is offline



Reply to Thread New Thread

« Previous Thread | Next Thread »

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

All times are GMT +1. The time now is 07:00 PM.
Copyright ©2000 - 2012, Jelsoft Enterprises Ltd.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2
Design & Developed by Amodity.com
Copyright© Amodity