Hackers Selling Stolen Military And Defense Contractor Credentials For $10

Image by Kevin Ku, from Unsplash

Hackers Selling Stolen Military And Defense Contractor Credentials For $10

Reading time: 2 min

A new report by cybersecurity firm Hudson Rock reveals a troubling security breach affecting the U.S. military, federal agencies, and top defense contractors, including Lockheed Martin, Boeing, and Honeywell.

In a Rush? Here are the Quick Facts!

  • Malware steals VPN access, email logins, and multi-factor authentication session cookies.
  • 398 Honeywell employees were infected, exposing internal systems and third-party credentials.
  • U.S. Navy personnel had their login details stolen, risking military system breaches.

The report claims that employees in these organizations have been infected with “infostealer” malware, which collects login credentials, email access, and other sensitive data.

Unlike traditional cyberattacks that involve hacking into networks, infostealer malware waits for a user to unknowingly download an infected file—often a game mod, pirated software, or a malicious email attachment.

Once installed, the malware collects login details, browsing history, and stored passwords. Cybercriminals then sell this stolen data for as little as $10 per compromised computer on underground markets, as detailed in the report.

Among the stolen information are credentials for VPNs, government email accounts, and classified procurement systems. Even multi-factor authentication (MFA) can be bypassed using stolen session cookies, allowing hackers to gain unauthorized access to secure systems.

The report highlights that employees at some of the most critical U.S. defense companies have been affected. One case study shows that 398 Honeywell employees had their credentials leaked, exposing internal portals and software tools. Additionally, 472 third-party accounts connected to Microsoft, Cisco, and SAP were also compromised.

Beyond the private sector, the U.S. Army and Navy have also been targeted, with at least 30 Navy personnel having their login credentials and browsing history stolen. Even the FBI and Government Accountability Office (GAO) have been impacted, raising concerns about national security risks.

Hudson Rock warns that these breaches don’t just affect the individual companies involved. Many organizations work together in the defense industry, meaning a security breach in one company can expose its entire network of partners, suppliers, and government agencies.

While cybersecurity measures exist to monitor and detect such breaches, experts stress the importance of prevention.

The researchers say that companies and government agencies must enforce stronger cybersecurity practices, including stricter download policies, improved employee training, and enhanced malware detection tools.

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!

We're thrilled you enjoyed our work!

As a valued reader, would you mind giving us a shoutout on Trustpilot? It's quick and means the world to us. Thank you for being amazing!

Rate us on Trustpilot
0 Voted by 0 users
Title
Comment
Thanks for your feedback
Loader
Please wait 5 minutes before posting another comment.
Comment sent for approval.

Leave a Comment

Loader
Loader Show more...