DopplePaymer creators disclose documents of Lockheed Martin, SpaceX and Tesla’s Supplier Visser Precision
DopplePaymer ransomware creators have once again published data of their victims on the web. However, this type the affected organizations include Lockheed Martin, SpaceX, Tesla, Boeing, Honeywell, Blue Origin, Joe Gibbs Racing, Sikorsky, the University of Colorado, the Cardiff School of Engineering, and others.
DopplePaymer ransomware has hit Visser Precision, a manufacturing and design contractor in the US whose clients include the above listed organizations. The attackers had given a deadline till end of March, and since the company didn’t pay the ransom, the criminals have now disclosed internal confidential documents belonging to Visser’s clients. Also, this data is made public on the internet and also includes a sensitive document of Lockheed-Martin’s military equipment, such as the antenna in an anti-mortar defense system as reported in The Register. Other documents include, billing and payment files, supplier details, data reports, SpaceX partner program details and legal documents.
Lockheed Martin is aware of the situation at Visser Precision, and following the procedures and working to respond to these cyberattacks related to our supply chains.
Lockheed Martin is known for its advanced technology, and is continuously working towards combating the evolving cyberattacks. They are also providing guidelines to their suppliers from the cybersecurity front and assisting them to enhance their cybersecurity strategies.
DopplePaymer creators have already disclosed sensitive information earlier, when the organizations failed to pay the ransom. They do this to threaten other organizations of their capabilities. Though it is not advisable to pay the ransoms of the cyber criminals, as it will motivate them to do more such acts in the future, it is also the responsibility of the organizations involved to secure and safeguard their business sensitive documents. Military sensitive documents of Lockheed Martin can be decisive, and if obtained by the negative entities, then it can be used as per their wish or sold in the dark web.
Organizations need to build robust cybersecurity policies and strategies, including their supply chain as supply chain attacks have also proven to be devastating if not taken care. Paying ransom is not appreciated, but some experts suggest that it’s a critical corporate or nation wide document, caving in and paying up can be considered. However, we also need to remember, hackers may not erase the documents, and still post the same on the dark web even if the organization pays the ransom.
Keep your cybersecurity solid, employ proactive tools and try to reduce your probability of being hit by these malicious actors.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.