SHARE
Facebook X Pinterest WhatsApp

Northrop Grumman a Regular Target of Hackers

Organized hackers have been attempting to breach aerospace and defense company Northrop Grumman for years to steal sensitive information, according to a Northrop Grumman senior executive at the Gartner security summit. The APTs (advanced persistent threats) are designed to infiltrate networks at companies and government agencies to steal intellectual property or other sensitive information. As […]

Jun 28, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Organized hackers have been attempting to breach aerospace and defense company Northrop Grumman for years to steal sensitive information, according to a Northrop Grumman senior executive at the Gartner security summit.

The APTs (advanced persistent threats) are designed to infiltrate networks at companies and government agencies to steal intellectual property or other sensitive information. As one of the largest defense contractors in the country, Northrop Grumman is a lucrative target.

"These advanced attacks have been going on for several years," said Timothy McKnight, vice president and chief information security officer at Northrop Grumman, during a panel discussion on APTs at the Gartner Security and Risk Management Summit in Washington, D.C., June 21.

Northrop Grumman has created profiles of about a dozen distinct groups constantly battering the company based on the information collected by its monitoring, detection and prevention systems, McKnight said. The cyber-intelligence group keeps tabs on the attackers, including attack procedures used and the kind of malware designed.

A typical attack method involves using zero-day vulnerabilities to compromise end-user machines, according to McKnight. About 300 zero-day attack attempts were recorded last year, and the pace has ramped up enormously to several exploits coming in throughout the day.

"Every attack, in order to succeed, needs to exploit a vulnerability," John Pescatore, a Gartner distinguished analyst, said during a separate discussion at the summit.

To read the original eWeek article, click here: Northrop Grumman Regularly Repels Advanced Attacks Seeking Sensitive Data

Recommended for you...

Mission Announces New Multi-Product Solutions in AWS Marketplace
Jordan Smith
Dec 10, 2025
CrewAI CEO: Human Trust is Core to Autonomous AI Agents
Jordan Smith
Dec 9, 2025
Sparklight Launches Partner Solutions Program
Jordan Smith
Dec 8, 2025
ISC2 Report Shows AI Excitement, Risk Worry, and Burnout
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.