Airbus was the victim of a data breach after a hacker recovered the contacts of 3,200 suppliers of the European aerospace giant after infecting the computer of an airline employee, as learned on Friday, September 15 from consistent sources.
This attack, known as “bounce”, allowed the hacker acting under the nickname “USDoD” to recover the names, addresses, email addresses and telephone numbers of employees of companies such as Thales or Rockwell Collins, the cybersecurity company revealed. Hudson Rock.
“Airbus has launched an investigation into a cyberattack in which a computer account associated with an Airbus customer has been attacked. This account was used to download commercial documents dedicated to this customer from an Airbus web portal,” confirmed the European giant.
Infiltrated organizations
On August 21, the hacker managed to infect the computer of a Turkish Airlines employee to obtain his credentials that would allow him to connect to a specific Airbus portal where the contact details of 3,200 suppliers are accessible, details Hudson Rock.
“Breakthrough infections have increased an incredible 6,000% since 2018, making them the leading initial attack vector used to infiltrate organizations and execute cyberattacks, including ransomware, data theft, account takeover, and corporate espionage.” ”says the cybersecurity company.
This data theft is on a much smaller scale than that which affected Airbus in 2019, when a series of attacks involving several subcontractors aimed to recover aeronautical technical certification documents, in particular. It was then suspected that these industrial espionage operations were directed from China.
“As an important player in high technology and industry, Airbus is a target for malicious actors,” recalls the manufacturer, which ensures that “it permanently monitors the activities in its computer systems, has solid tools, protection systems, qualified cyber experts and associated processes to protect the company.
Source: BFM TV

