ThyssenKrupp's technical trade secrets stolen in massive hack

Asian hackers were able to steal the information in an organised attack

German steel maker ThyssenKrupp has revealed its technical trade secrets have been stolen in a cyber attack on its systems.

The company's own investigations revealed southeast Asian hackers were the primary suspects, launching a highly organised and professional attack on the organisation.

ThyssenKrupp uncovered the attacks in April, although the criminal activity apparently happened in February and involved the hackers stealing project data from the company's plant engineering division and other areas of its business.

Advertisement - Article continues below

"According to our analyses, the aim was essentially to steal technological know-how and research from some areas of Business Area Industrial Solutions as well as Business Area Steel Europe (espionage)," a ThyssenKrupp spokesperson said in a statement.

"Specially secured IT systems for especially critical have not been concerned (e.g IT of Business Unit Marine Systems or production IT of blast furnaces and power plants in Duisburg). The same is true for the other productions systems and processes in the Group as well as for the quality of the products and services of ThyssenKrupp."

The company added that there had been no evidence of sabotage and no signs that any hacker tried to manipulate data, applications or any other resources.

However, German business magazine Wirtschafts Woche claimed the attacks specifically targeted ThyssenKrupp's production plants in areas of Europe, India, Argentina and the US.

Advertisement
Advertisement - Article continues below

"The attack was discovered, continuously observed and analysed by ThyssenKrupps CERT (Computer Emergency Response Team). Chief Information Officers of all Business Areas have been involved," the company added.

Advertisement - Article continues below

"The attacked IT systems have been revised. Since then, all of ThyssenKrupps IT systems are being controlled for new attempted attacks (24/7 monitoring)."

Authorities in the state of North Rhine-Westphalia in Germany are investigating the attacks and are keeping state and federal cyber security and data protection authorities in the loop.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020
Visit/security/malware/356231/most-malware-came-through-https-connections-in-q1-2020
malware

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020
Visit/security/hacking/356210/trump-administration-wants-to-enhance-the-security-of-gov-sites
hacking

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/security/34616/the-top-password-cracking-techniques-used-by-hackers
Security

The top 12 password-cracking techniques used by hackers

12 Jun 2020