Swiss Defense Contractor RUAG Breach Results in 23GB Of Stolen Data

Swiss defense contractor RUAG was hacked recently and the assailants obtained 23GB of data. These numbers were recently revealed as part of an investigation by Melani, an IT security firm hired by RUAG. For the time being, it remains unclear as to who is behind this breach.

RUAG Breach Is More Severe Than Initially Assumed

With 23 gigabytes of sensitive information stolen from a defense contractor, the repercussions of the recent RUAG breach could be far more serious than most people anticipate. However, the investigation into this breach has not turned up any culprits, nor are there additional details as to which information was obtained exactly.

It is also possible a portion of this data contains duplicate information, which could explain the vast size of 23GB. Additionally, this stolen data also includes requests made to and from the command-and-control servers. The Swiss government wanted to make it clear it is highly unlikely any sensitive personal information has been leaked.

Initial assumptions indicated Russian hackers would be behind the RUAG breach, yet those allegations have not been confirmed by official sources. We do know the assailants used Turla malware to infect RUAG servers, and the entire process of obtaining this information was subject to a patient and meticulous approach. The assailants only infiltrated the network after correctly identifying their targets, with the Active Directory being the primary target.

Related Post

This breach went by unnoticed for quite some time, as the hackers used named pipes for communication between infected machines. Moreover, some of these machines only distributed control-and-command servers’ commands, comparable to how most peer-to-peer networks operate. It does not appear as if the Turla malware contained a rootkit functionality, though.

Although this breach dates back to September of 2014, the incident was only reported to the public in January of 2016. Melani, a Swiss security research firm, is in the process of completing their RUAG investigation. Moreover, the company also stressed the importance of sharing details regarding these incidents with other parties as soon as possible, rather than delaying it.

Source: Melani

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

13 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

1 day ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

1 day ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

2 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

3 days ago

Polygon Raises Network Capacity To 140M Gas

Polygon has made a big move in cementing its mission as one of the leading…

4 days ago