U.S. Military Drone Documents Found For Sale On The Dark Web

An MQ-9 Reaper, armed with GBU-12 Paveway II laser guided munitions and AGM-114 Hellfire missiles, piloted by Col. Lex Turner flies a combat mission over southern Afghanistan. (U.S. Air Force Photo / Lt. Col. Leslie Pratt)

Wall Street Journal: Stolen U.S. Military Drone Documents Found for Sale on Dark Web, Researchers Say

Discovery comes amid heightened concern about how U.S. military secrets may be insufficiently protected from hackers.

An unidentified hacker tried to sell purported U.S. military documents containing information about combat drones last month, a cybersecurity research firm said, after they were allegedly stolen from an Air Force officer’s computer.

The hacker sought buyers for maintenance documents about the MQ-9 Reaper drone, a remotely controlled aerial vehicle used by the Pentagon and other parts of the government to conduct offensive strikes or reconnaissance and surveillance operations.

Discovery of the attempted sale of the stolen documents comes amid heightened concern about how U.S. military secrets may be insufficiently protected from hackers. Military officials said last month that the Defense Department’s inspector general was investigating a major security breach after Chinese hackers allegedly stole data pertaining to submarine warfare, including plans to build a supersonic antiship missile.

Read more ....

More News On U.S. Military Drone Documents Found For Sale On The Dark Web

US Reaper drone data leaked on dark web, researchers say -- CNN
Mystery hacker trying to sell stolen US military documents, cybersecurity researchers say -- FOX News
Researchers find stolen military secrets for sale on the dark web -- CNET
A hacker stole instructions for Reaper drones and is selling them on the dark web -- VICE News
A hacker was caught selling a stolen Air Force drone manual for $200 on the dark web -- The Verge
A Hacker Sold U.S. Military Drone Documents On The Dark Web For Just $200 -- Forbes

Subscribe to receive free email updates: