Swiss Defense Contractor RUAG Breach Results in 23GB Of Stolen Data

Swiss defense contractor RUAG was hacked recently and the assailants obtained 23GB of data. These numbers were recently revealed as part of an investigation by Melani, an IT security firm hired by RUAG. For the time being, it remains unclear as to who is behind this breach.

RUAG Breach Is More Severe Than Initially Assumed

TheMerkle_RUAG Swiss Defense Contractor Breach MelaniTheMerkle_RUAG Swiss Defense Contractor Breach Melani

With 23 gigabytes of sensitive information stolen from a defense contractor, the repercussions of the recent RUAG breach could be far more serious than most people anticipate. However, the investigation into this breach has not turned up any culprits, nor are there additional details as to which information was obtained exactly.

It is also possible a portion of this data contains duplicate information, which could explain the vast size of 23GB. Additionally, this stolen data also includes requests made to and from the command-and-control servers. The Swiss government wanted to make it clear it is highly unlikely any sensitive personal information has been leaked.

Initial assumptions indicated Russian hackers would be behind the RUAG breach, yet those allegations have not been confirmed by official sources. We do know the assailants used Turla malware to infect RUAG servers, and the entire process of obtaining this information was subject to a patient and meticulous approach. The assailants only infiltrated the network after correctly identifying their targets, with the Active Directory being the primary target.

Related Post

This breach went by unnoticed for quite some time, as the hackers used named pipes for communication between infected machines. Moreover, some of these machines only distributed control-and-command servers’ commands, comparable to how most peer-to-peer networks operate. It does not appear as if the Turla malware contained a rootkit functionality, though.

Although this breach dates back to September of 2014, the incident was only reported to the public in January of 2016. Melani, a Swiss security research firm, is in the process of completing their RUAG investigation. Moreover, the company also stressed the importance of sharing details regarding these incidents with other parties as soon as possible, rather than delaying it.

Source: Melani

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Pi Coin Price Stalls Below $0.78, Ondo Finance Market Cap Crosses $3B, Unstaked Rises as Fastest Growing Crypto 2025

Pi Coin Price Battles $0.78, Ondo Finance Market Cap Reclaims $3B, Unstaked Races Ahead as…

2 hours ago

Cold Wallet vs MetaMask: The Privacy-First Crypto Wallet Redefining Control

Cold Wallet’s $CWT Set for 4,900% ROI While Polkadot and Sui Fuel Altcoin Season Comeback…

2 hours ago

Web3 ai Projects 1747% ROI as HBAR Faces Resistance and TRX Climbs

Hedera Tests Key Resistance While Tron Climbs and Web3 ai Projects 1747% ROI as the…

3 hours ago

PEPE Set for Breakout, BlockDAG’s 90% Rollback Fires Up $218.5M Presale! MANTRA’s Big Move

PEPE Set for Breakout, MANTRA Burns 300M Tokens, But BlockDAG’s 90% Rollback Is the Real…

3 hours ago

Ethena Labs Transforms into Institutional DeFi Powerhouse Amid Expanding Product Suite

Once known just as a synthetic dollar provider in the DeFi world, Ethena Labs is…

15 hours ago

$SUI Surges 60% in One Week as Ecosystem Activity Explodes

In a striking display of momentum, $SUI's price has rocketed upward by 60% over the…

15 hours ago