Israel’s advanced missile defense system, Iron Dome, has received substantial press coverage during the recent hostilities between Israel and Hamas.

 Iron Dome anti-missile system

Iron Dome Anti-Missile System

Brian Krebs is reporting that security firm Cyber Engineering Services Inc. (CyberESI), has uncovered a massive theft of Iron Dome technical data from three defense contractors involved with the Iron Dome system. How did the bad guys get into the systems to steal this intellectual property? Spearphishing. The attackers used deceptive email as the infiltration phase of an Advanced Persistent Threat (“APT”). As Michael Assante, project lead for Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) security at the SANS Institute, observed in the Krebs on Security posting, intelligence and information sharing is of limited value in preventing APT actors from accomplishing their objectives because the notifications come in after the data has been stolen.  Incident response is, by its very nature, responsive.  The first actor is the attacker — the response must follow the attack and its subsequent discovery. That cycle can be broken by challenging the attacker during the infiltration by unmasking the deceptive email. Letting users decide which emails to trust is dangerous. Using SP Guard, IT can determine a list of trusted senders and provide this information to staff in a simple and highly effective manner. You can contact us using our online form.