Skip to main content
We may receive compensation from affiliate partners for some links on this site. Read our full Disclosure here.

More Details Surrounding Italian Defense Contractor Leonardo

Late last year several arrests were made in relation to hacking and data theft, that went undetected at Leonardo for two years.


41,765 views

Something is rotten in Rome. 

Recently, an ex C.I.A. operative named Bradley Johnson came out, and alleged some interesting details about Leonardo’s role in the 2020 election fraud

I was able to dig up some reports from late last year that I think many of you will find very interesting……

Apparently, Leonardo had a major hack and data theft that went on undetected for two years; 10 GB of data, and roughly 100,000 files were stolen. 

The stolen files fell under various categories like product distribution, HR, and security. 

‘Security’ is an extremely broad word that can mean anything; I wonder what these hackers were doing, and who they were doing it for. 

Check it out: 

Reuters reported on the story: 

ROME (Reuters) - Police arrested two people on Saturday who have worked at Leonardo for their alleged role in hacking the Italian defence group’s computers to steal sensitive information between 2015 and 2017, prosecutors in the southern city of Naples said.

Naples prosecutors said a former employee in Leonardo’s cybersecurity department was suspected of having used malware to infect 94 computers to extract “classified information of significant value to the company”.

The information was stolen for “illicit goals which are still being investigated”, they said in a statement, adding that the person in question had been detained by police.

ZD Net had more details: 

Headquartered in Rome, Italy, the company accounts for over 49,000 employees and maintains a presence in its home location, the UK, US, and Poland across the aerospace, military, and security sectors.

Last week, Italian law enforcement said the pair -- one of which was an IT manager for Leonardo -- were arrested for allegedly compromising the corporation's network by executing malware able to quietly exfiltrate sensitive data.

According to the Naples office, the duo deployed malware dubbed cftmon.exe on 94 workstations, of which 33 were located at the company plant in Pomigliano D'Arco. The malware, described as a Trojan variant, was loaded through USB sticks plugged into the workstations and remained undetected from roughly May 2015 to January 2017.



 

Join the conversation!

Please share your thoughts about this article below. We value your opinions, and would love to see you add to the discussion!

Hey, Noah here!

Wondering where we went?

Read this and bookmark our new site!

See you over there!

Thanks for sharing!