Lockheed Martin Suppliers Targeted in an Attempt to Gain Access

What do you do when nation states launch cyber attacks against some of your top suppliers? If you are Lockheed Martin, you try to help them develop more robust security measures. The U.S. military’s top supplier of information technology, Lockheed Martin, has fortified its own operations and networks to the point where cyber terrorists have resorted to attacks against their top suppliers in an attempt to obtain information that would somehow allow them access to Lockheed’s data, according to a report by Reuters.

Lockheed has stepped up its own efforts to work with their suppliers in an attempt to shore up their security efforts. With the number of cyber attack campaigns increasing dramatically over the past several years, company officials thought it was only a matter of time before such attacks became commonplace. With 20 percent of the attacks being considered advanced persistent threats, it would seem that in addition to becoming more numerous, the attacks were also increasing in their sophistication.

This is in light of recent reports of increased warnings of cyber attacks on U.S. banks and other institutions in the past year. Even more alarming are the reports of the development of attackers’ abilities to take down power grids and even government systems. Internal analyses have shown that the number of attack campaigns have grown and can even be linked.

With 5 to 8 percent of Lockheed Martin’s revenues dealing with the cyber security sector and a generation of $9.4 billion in sales, it is Lockheed’s hope to grow business in the cyber security sector, especially in dealing with its suppliers. Lockheed feels that if its supplier networks are safer, it will lead to an overall increase in security.

Luckily for Lockheed, they have seen no actual compromising of its network, but that is not from a lack of trying. Two recent breaches at three of their suppliers was a cause for some concern and could have easily led to a compromising of the company’s data. The attacker launched an attack against Lockheed’s network using information gained from the three companies. Lockheed, fortunately, had the attacker under observation long before the attack on its network and was able to thwart their attempts. This example strongly demonstrates the need for security from a business’ suppliers.

For more information about how Lockheed Martin is dealing with cybersecurity through its suppliers, visit: http://uk.reuters.com/article/2012/11/13/us-lockheed-cyber-idUKBRE8AC02S20121113