[BreachExchange] ThyssenKrupp's technical trade secrets stolen in massive hack

Audrey McNeil audrey at riskbasedsecurity.com
Fri Dec 9 13:58:51 EST 2016


http://www.itpro.co.uk/hacking/27746/thyssenkrupps-technical-trade-secrets-
stolen-in-massive-hack

German steel maker ThyssenKrupp has revealed its technical trade secrets
have been stolen in a cyber attack on its systems.

The company's own investigations revealed southeast Asian hackers were the
primary suspects, launching a highly organised and professional attack on
the organisation.

ThyssenKrupp uncovered the attacks in April, although the criminal activity
apparently happened in February and involved the hackers stealing project
data from the company's plant engineering division and other areas of its
business.

"According to our analyses, the aim was essentially to steal technological
know-how and research from some areas of Business Area Industrial Solutions
as well as Business Area Steel Europe (espionage)," a ThyssenKrupp
spokesperson said in a statement.

"Specially secured IT systems for especially critical have not been
concerned (e.g IT of Business Unit Marine Systems or production IT of blast
furnaces and power plants in Duisburg). The same is true for the other
productions systems and processes in the Group as well as for the quality
of the products and services of ThyssenKrupp."

The company added that there had been no evidence of sabotage and no signs
that any hacker tried to manipulate data, applications or any other
resources.

However, German business magazine Wirtschafts Woche claimed the attacks
specifically targeted ThyssenKrupp's production plants in areas of Europe,
India, Argentina and the US.

"The attack was discovered, continuously observed and analysed by
ThyssenKrupp´s CERT (Computer Emergency Response Team). Chief Information
Officers of all Business Areas have been involved," the company added.

"The attacked IT systems have been revised. Since then, all of
ThyssenKrupp´s IT systems are being controlled for new attempted attacks
(24/7 monitoring)."

Authorities in the state of North Rhine-Westphalia in Germany are
investigating the attacks and are keeping state and federal cyber security
and data protection authorities in the loop.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20161209/89d9e88b/attachment.html>


More information about the BreachExchange mailing list