According to Hudson Rock’s cybercrime intelligence data, over 30,000 infected devices across defense sectors—including Lockheed Martin, Boeing, and the U.S. Navy—have leaked credentials enabling unauthorized access to classified networks, procurement systems, and military AI development platforms. A new class of cyber threats leveraging $10 infostealer malware kits has compromised critical U.S. military, defense contractor, and federal agency systems, exposing vulnerabilities in national security infrastructure. The U.S. Navy reported 30 compromised personnel with leaked credentials to classified naval logistics systems (OWA), training platforms (USALearning.gov), and McAfee ePolicy Orchestrator consoles. With threat actors selling military credentials for less than $20 on dark web marketplaces, the operational cost of breaching national security infrastructure has collapsed to alarmingly low thresholds. Hudson Rock’s analysis revealed the engineer’s device also contained unencrypted FTP credentials for missile guidance system documentation and session cookies for Pentagon-approved cloud platforms. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. While tools like Hudson Rock’s CavalierGPT monitor credential exposures, experts emphasize enforcing endpoint detection, application allowlisting, and mandatory MFA revocation protocols to mitigate the $10 malware epidemic. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 19 Feb 2025 13:45:06 +0000