US military and defense contractors hit with Infostealer malware


- US military agencies and defense contractors hit by infostealer malware
- The malware can exfiltrate victim’s data
- Researchers discovered thousands of infected devices
Despite their multi-billion dollar budgets, US agencies have been infected by Infostealer malware, and have had credentials and information stolen from official devices.
A report from Hudson Rock has revealed for as little as $10 per computer, criminals can ‘purchase stolen data from employees who work in classified defense and military sectors’.
Infostealers are a type of malware that has developed as a crucial tool for cybercriminals. As the name suggests, they gather sensitive information stored on a victim’s device, usually to leverage in identity theft, extortion, or financial fraud – but in this case, it’s likely to be confidential or classified data, potentially relating to national security.
Infostealers don’t rely on brute-force attacks, but instead prey upon human error – here’s what we know so far.
Supply chain compromise
Researchers found infected users from six contractors; Lockheed Martin, BAE systems, Boeing, Honeywell, L3Harris, and Leidos. These defense contractors work on seriously advanced military technology, including warships, F-35 jets, and more – Lockheed Martin alone was awarded $5.1 billion worth of contracts by the Department of Defence in 2024.
In total, 472 third-party corporate credentials were exposed, including Cisco, SAP Integrations, and Microsoft from contractors. Businesses, organizations, and even government departments are increasingly interdependent, and supply chain vendors have been frequently utilized in attacks– “if an adversary wanted to infiltrate a defense contractor’s supply chain, this would be their golden ticket,” the report confirms.
The report outlined an example of how Honeywell’s infrastructure was compromised – including its internal intranet, an Active Directory Federation Services login, and an Identity and Access Management system. Researchers discovered 398 infected employees and 18,527 infected users for Honeywell systems over the years, and just one compromised employee held 56 corporate credentials for Honeywell’s infrastructure, as well as 45 additional third-party credentials – showing the scale of the risk.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
But contractors weren’t the only victims, with infections found in US Army, US Navy, FBI, and Government Accountability Office (GAO) systems too, with local authentication data for OWA, Confluence, Citrix, and FTP found, which ‘suggests an adversary could move laterally inside military systems’.
Third-party data breaches have become a major security concern, and emerging threats have found that almost all (98%) of European companies have experienced a third-party breach in the last year.
In late 2024, the US Treasury Department declared a ‘major incident’ after experiencing a breach through its vendor ‘BeyondTrust’ – so these threats are not just hypothetical. There are real dangers associated with national security if third-party vendors are compromised, especially if the vendors hold classified information.
Infostealer risks
How serious is this? Well, it’s not great. As the report points out, “if Infostealers can breach Lockheed, Boeing, the U.S. Army, and the FBI, they can breach anyone”. These breaches reinforce the idea that any organization, no matter how good their cyber hygiene is, or how strong their cybersecurity defenses, can be compromised.
The most common infostealers are Lumma Stealer, Vidar, RedLine, and Medusa – and these can exfiltrate your data in under a minute, so here are some tips to stay safe.
Unfortunately, there’s no one way to avoid Infostealers, it’s mostly about keeping good cyber hygiene. Infostealers primarily rely on user error, like accidentally downloading an infected PDF, pirated software crack, or clicking a malicious link.
Much like with social engineering attacks, the best defense is being aware and staying vigilant. Don’t click on links you don’t trust, don’t visit unverified sites, and if you work in an industry like defense, security, or a government agency – it’s probably best to stick strictly to official sites.
Infostealers are a type of malware, so deploying the best malware removal software can make sure there’s no lingering threat – but to dodge the threat, you need to be on the ball.
Make sure you have a strong password and use unique credentials for each login – it’s a faff, but it keeps you protected. If one password is compromised, then all others can be if you reuse your passwords.
Organizations should be sure to run regular and thorough cybersecurity training sessions for all employees at every level, so that everyone understands the risks and the severity of a breach.
Assessing the security posture of software suppliers and vendors can save you from a critical breach, and with breaches often costing millions of dollars and damaging an organization’s reputation, this can be a crucial safety policy for your company.
You might also like
US military agencies and defense contractors hit by infostealer malware The malware can exfiltrate victim’s data Researchers discovered thousands of infected devices Despite their multi-billion dollar budgets, US agencies have been infected by Infostealer malware, and have had credentials and information stolen from official devices. A report from Hudson Rock…
Recent Posts
- Here’s when and where you can preorder the new iPhone 16E
- The Humane AI Pin debacle is a reminder that AI alone doesn’t make a compelling product
- This 1.9-pound smartphone’s massive battery offers six months of standby
- Movie sales – including 4K Blu-ray – fell again last year, but if you’re going streaming only, you’re massively missing out
- A new and dangerous keylogger is on the loose – here’s how to stay safe
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010