Google has revealed that state-sponsored hackers are increasingly targeting defence sector employees, with a "relentless barrage of cyber operations" aimed at industrial supply chains across the EU and US. This trend is marked by a shift towards more personalised attacks on individuals, often via their personal systems outside corporate networks.
The scope of these threats has expanded to include smaller companies beyond direct defence suppliers, such as car manufacturers and ball bearing firms. Extortion attacks are also being used to target these entities.
Recent attacks by state-linked hackers, including those linked to Russian intelligence, demonstrate the breadth of this threat. These actors have spoofed websites of leading defence contractors from multiple countries, attempted to steal information from Ukrainian military personnel's Signal and Telegram accounts, and even impersonated drone builders or training courses to compromise frontline drone units.
Ukrainian authorities have reported a significant increase in cyber incidents, with a 37% rise in the past year. This is attributed to individualised attacks on employees, with some targets monitored for weeks before an attack.
Beyond Ukraine, other state-sponsored groups are employing similar tactics against defence suppliers and individuals seeking employment in the sector. North Korean hackers have used AI to profile potential targets, impersonating corporate recruiters to gain access to leading defence contractors. Iranian and Chinese state-sponsored groups have also been involved in targeted attacks on employees of aerospace and defence companies.
The implications of these threats go beyond national borders, with foreign technology investments and joint industrial projects expanding the pool of potential victims. As western technologies become integrated into Ukraine's military aid and joint projects, individuals involved in these initiatives are becoming increasingly vulnerable to cyber-attacks.
The scope of these threats has expanded to include smaller companies beyond direct defence suppliers, such as car manufacturers and ball bearing firms. Extortion attacks are also being used to target these entities.
Recent attacks by state-linked hackers, including those linked to Russian intelligence, demonstrate the breadth of this threat. These actors have spoofed websites of leading defence contractors from multiple countries, attempted to steal information from Ukrainian military personnel's Signal and Telegram accounts, and even impersonated drone builders or training courses to compromise frontline drone units.
Ukrainian authorities have reported a significant increase in cyber incidents, with a 37% rise in the past year. This is attributed to individualised attacks on employees, with some targets monitored for weeks before an attack.
Beyond Ukraine, other state-sponsored groups are employing similar tactics against defence suppliers and individuals seeking employment in the sector. North Korean hackers have used AI to profile potential targets, impersonating corporate recruiters to gain access to leading defence contractors. Iranian and Chinese state-sponsored groups have also been involved in targeted attacks on employees of aerospace and defence companies.
The implications of these threats go beyond national borders, with foreign technology investments and joint industrial projects expanding the pool of potential victims. As western technologies become integrated into Ukraine's military aid and joint projects, individuals involved in these initiatives are becoming increasingly vulnerable to cyber-attacks.