• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Intelligence
  • Security
  • QinetiQ breached by long Chinese cyber espionage campaign

QinetiQ breached by long Chinese cyber espionage campaign

Pierluigi Paganini May 05, 2013

Bloomberg published a report on QinetiQ data breach, the company has been compromised from 2007 to 2012 by Chinese hackers.

The UK-based defense contractor QinetiQ is vulnerable to cyber attacks, the news is sensational and has created a lot of noise on the Internet, due the critical role of the company as primary providers for U.S. Governments.

The source of intelligence confirmed that QinetiQ was not able to defend classified documents and technological information from cyber espionage having Chinese origin.

QinetiQ Chinese hack

QinetiQ North America (QQ) is a world leading defense technology and security company that provide technological equipment such as satellites, drones and software services to the U.S. Special Forces in Afghanistan and Middle East Area.

Bloomberg revealed that the attacks dates Ciback to 2007 when the NCIS (Naval Criminal Investigation Service) warned allegedly about the possible data breach from two staffers’ laptops, and the incidents weren’t isolated, they continued throughout 2008 and 2009.

Several incidents have occurred without attracting attention and concern on the part of the company’s management. The data are surprising, according Bloomberg  more than 13,000 server passwords were stolen and used to acquire sensitive information and more than 3.3 million pages of Microsoft Excel spreadsheets were exposed.

The investigation revealed a disturbing scenario, around 1.3 million pages of documents, many of them including secret military information were stolen, but the news more concerning is that probably other contractors were hacked.

Chinese hackers belonging to Comment Crew have conducted an extended operation to steal the sensitive information, the campaigns started on 2009 when the hackers compromised at least 151 machines of the company Technology Solutions Group (TSG), a QinetiQ NA division, the attacks lasted around 251 days during which they have stolen 20 gigabytes of data before being blocked. Mandiant identified the Comment Crew as the People’s Liberation Army Unit 61398.

“Over one stretch in 2009, the spies spent 251 days raiding at least 151 machines, including laptops and servers, cataloging TSG’s source code and engineering data,”.

, “The hackers dribbled data out of the network in small packets to avoid detection, managing to get away with 20 gigabytes before they were finally stopped, according to an internal damage assessment.”

The hackers exploited from 2007 to 2010 unpatched security flaws and other vulnerabilities (e.g. Lack of two-factor authentication) to infiltrate various divisions of QinetiQ such as Cyveillance, the corporate cybersecurity unit.

On the theft of digital secrets Bloomberg reports:

“In four days of furious activity, the hackers rifled at least 14 servers, taking particular interest in the company’s Pittsburgh location, which specialized in advanced robotics design. The Comment Group also used Back’s password to raid the computer of QinetiQ’s Huntsville, Alabama-based technology control officer, which contained an inventory of highly sensitive weapons-systems technology and source code throughout the company. The spies had got their hands on a map to all of QinetiQ’s digital secrets.”

News of a data breach was reported in the emails leaked from security firm HBGary in 2011, HBGary was hired by QinetiQ to investigate on the data breach. The email revealed that a large amount of data on sensitive technologies were exposed due a series of malware based attacks apparently having Chinese origin that might have caused the loss, in economic terms, for billions of dollars.

“My feeling is that if an attacker has been in your environment for years, your data is gone,” “Everything about your business is known, cataloged, analyzed, by your enemy,” Wallisch wrote. “I don’t feel a sense of urgency anymore.”

HBGary’s principal investigator Phil Wallisch, wrote in an e-mail to a colleague in December 2010, curious that same HBGary suffered one of the most popular data breach in the same period.

According security experts QinetiQ committed the serious error to restrict the investigation on the first discovery of data breach despite it was informed on possible compression of its systems. The NASA reported  QinetiQ that it was being attacked by hackers from one of its machines, but apparently the warning was not followed, once again in the discussion there is the need to share information on cyber attacks to mitigate the cyber threats.

Another shocking news revealed by Bloomberg is that QinetiQ NA hired consultancy Mandiant in 2012 but  ignored its security advices for example when the security firm in March 2010 discovered an intrusion in QinetiQ network made by Comment Crew hackers.

“Comment Crew had “gained almost complete control over the company’s network. They had operated unhindered for months-long stretches and they had implanted multiple, hidden communications channels to extract data. Privately, the investigators concluded that the spies had gotten everything they wanted from QinetiQ’s computers.” Bloomberg reported.

This is a sad story made worse if we consider that QinetiQiIn May 2012 received a $4.7 million cyber-security contract from the U.S. Transportation Department, To them the company has been entrusted various missions including  protection of the country’s critical transport infrastructure.

“When it comes to cyber security QinetiQ couldn’t grab their ass with both hands, so it cracks me up that they won,” Bob Slapnik, vice president at HBGary, wrote after QinetiQ received a grant from the Pentagon in 2010 to advise it on ways to counter cyber espionage.

Hopefully someone have experience of what happened, the cyber security is a national need not occasion for profit.

Pierluigi Paganini

(Security Affairs – Cyber espionage)


facebook linkedin twitter

Bloomberg cyber espionage data breach Hacking HBGary Mandiant People’s Liberation Army PLA QinetiQ

you might also like

Pierluigi Paganini July 11, 2025
U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
Read more
Pierluigi Paganini July 10, 2025
PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

    Uncategorized / July 11, 2025

    U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 11, 2025

    UK NCA arrested four people over M&S, Co-op cyberattacks

    Cyber Crime / July 10, 2025

    PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

    Hacking / July 10, 2025

    Qantas data breach impacted 5.7 million individuals

    Data Breach / July 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT