U.S. defense contractor Electronic Warfare announces data breach.

news

US defense contractor Electronic Warfare Associates (EWA) has disclosed a data breach, saying attackers hacked its email system and stole files containing personal information.

http:// dojmt.gov/wp-content/uploads/Data-Breach-Notification-25.pdf

The company says the impact of the breach is limited, but it is aware that the attackers leaked files containing sensitive information.

EWA discovered on August 2, 2021, that a threat actor had hijacked one of its email accounts.

As a result of our investigation, we have determined that a threat actor infiltrated EWA’s email on August 2, 2021.

The situation came to light when the attacker attempted to commit wire fraud

We have no reason to believe that the purpose of the intrusion was to obtain personal information. However, the attackers’ activities resulted in the release of files containing certain personal information

Subsequent investigation revealed that the names, Social Security numbers (SSNs), and driver’s licenses of the recipients of the notifications had also been stolen.

It is also unclear whether the stolen information only affects the company’s employees, and whether any technical documentation was also stolen in the incident.

Customer base that attracts attention

EWA specializes in high-tech defense hardware and software solutions for communications, access control, simulation, training, management, testing, and surveillance systems (radar).

Many of these products are made for highly sensitive customers such as the US Department of Defense (Army, Navy, Air Force, DARPA, OSD), Department of Justice, and Department of Homeland Security (DHS).

Because these products are developed and designed in-house, a data breach into the company’s email system could have resulted in the compromise of sensitive military technology.

We also develop commercial products through subsidiary brands such as Corelis (electronic testing and analysis) and Blackhawk (debugging tools).

Comments

タイトルとURLをコピーしました