On December 14, 2018, The Wall Street Journal published an article titled, "Chinese Hackers Breach U.S. Navy Contractors"; this article appeared to be a follow-up to an article published by The Washington Post in June 2018, titled "Chinese Hackers Steal Unclassified Data From Navy Contractor." Both of these publications detail how actors who are likely associated with MUDCARP targeted the unclassified network of multiple cleared defense contractors in Newport, RI, and exfiltrated around 614 gigabytes of data pertaining to a number of US Navy programs, including program Sea Dragon, as well as sensitive cryptographic and electronic warfare libraries. By analyzing propriety sensor data and correlating it with previously identified MUDCARP indicators, iDefense analysts have likely identified the contractor that was targeted in early 2018, in addition to other Department of Defense (DoD) supply chain assets, including dozens of universities and government funded research laboratories.

The authors of the technical paper titled "Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience in Response to the Changing Character of War" draw attention to the issue of adversarial targeting of the DoD supply chain by stating that most nation states have a full complement of technologies and resources available to achieve their asymmetric strategies and goals as they relate to cyberespionage. They take advantage of the inherent vulnerabilities in the complex DoD supply chain ecosystem, namely a lack of oversight associated with operational security and siloed threat intelligence sharing.

As referenced in the “Accenture Cyber Threatscape Report 2018,” supply chains are integral to the DoD as the Department works to bring its technologies and weapon platforms to maturity. Threat actors have identified these supply chains as effective means of infiltrating victim organizations. Even verticals like aerospace and defense, in which companies have bought into the maintenance of mature security hygiene or in which the regulatory landscape has forced such adoption, supply chains still present openings.

Download the full article [PDF]

To learn more about Accenture Security Cyber Defense Services, how to apply threat intelligence to your cybersecurity operations, how to make better business decisions with threat intelligence or how to operationalize your cyberthreat intelligence, please contact us at idefense@accenture.com.


Accenture Security

Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence.  Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. All materials are intended for the original recipient only. The reproduction and distribution of this material is forbidden without express written permission from Accenture. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates. Given the inherent nature of threat intelligence, the content contained in this report is based on information gathered and understood at the time of its creation. It is subject to change. Accenture provides the information on an “as-is” basis without representation or warranty and accepts no liability for any action or failure to act taken in response to the information contained or referenced in this report.

Copyright © 2020 Accenture. All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks

Accenture Cyber Threat Intelligence

Subscribe to Accenture's Cyber Defense Blog Subscribe to Accenture's Cyber Defense Blog