Computer security

DopplePaymer creators disclose documents of Lockheed Martin, SpaceX and Tesla’s Supplier Visser Precision

DopplePaymer ransomware creators have once again published data of their victims on the web. However, this type the affected organizations include Lockheed Martin, SpaceX, Tesla, Boeing, Honeywell, Blue Origin, Joe Gibbs Racing, Sikorsky, the University of Colorado, the Cardiff School of Engineering, and others. 

DopplePaymer ransomware has hit Visser Precision, a manufacturing and design contractor in the US whose clients include the above listed organizations. The attackers had given a deadline till end of March, and since the company didn’t pay the ransom, the criminals have now disclosed internal confidential documents belonging to Visser’s clients. Also, this data is made public on the internet and also includes a sensitive document of Lockheed-Martin’s military equipment, such as the antenna in an anti-mortar defense system as reported in The Register. Other documents include, billing and payment files, supplier details, data reports, SpaceX partner program details and legal documents.

Lockheed Martin is aware of the situation at Visser Precision, and following the procedures and working to respond to these cyberattacks related to our supply chains.

Lockheed Martin is known for its advanced technology, and is continuously working towards combating the evolving cyberattacks. They are also providing guidelines to their suppliers from the cybersecurity front and assisting them to enhance their cybersecurity strategies.

DopplePaymer creators have already disclosed sensitive information earlier, when the organizations failed to pay the ransom. They do this to threaten other organizations of their capabilities. Though it is not advisable to pay the ransoms of the cyber criminals, as it will motivate them to do more such acts in the future, it is also the responsibility of the organizations involved to secure and safeguard their business sensitive documents. Military sensitive documents of Lockheed Martin can be decisive, and if obtained by the negative entities, then it can be used as per their wish or sold in the dark web. 

Organizations need to build robust cybersecurity policies and strategies, including their supply chain as supply chain attacks have also proven to be devastating if not taken care. Paying ransom is not appreciated, but some experts suggest that it’s a critical corporate or nation wide document, caving in and paying up can be considered. However, we also need to remember, hackers may not erase the documents, and still post the same on the dark web even if the organization pays the ransom.

Keep your cybersecurity solid, employ proactive tools and try to reduce your probability of being hit by these malicious actors.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.   

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 weeks ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 weeks ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

3 weeks ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

4 weeks ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

4 weeks ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

4 weeks ago