• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechF-35

Hackers Stole Restricted F-35 Data From an Australian Contractor

By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
October 14, 2017, 3:05 PM ET

Australian and U.S. Officials confirmed this week that an unnamed Australian defense firm involved in developing the F-35 fighter jet was hacked in November of 2016. The attackers, who may have been Chinese, stole large amounts of data on the F-35 and other vehicles and munitions.

A spokesman for the F-35 program told Defense News that the breach did not compromise any classified data. However, the data has been described by Australian authorities as commercially sensitive, and as including detailed schematics.

According to ZDNet, which first spotted the revelations in an Australian government report, the compromised data was restricted under the International Traffic in Arms Regulation, which controls the export of military technology from the U.S.

Australian officials have not identified a culprit, but the attack was carried out, in part, using a hacking tool known as “China Chopper.” According to Ars Technica, the tool has been used extensively by Chinese hackers in the past.

Get Data Sheet, Coins2Day’s technology newsletter.

The theft of defense schematics by the Chinese government or allied forces would fit a disturbing pattern. According to documents released by NSA whistleblower Edward Snowden in 2015, Chinese hackers have already compromised top secret data on the F-35. Experts allege that information has informed the design of Chinese fighter jets including the Chengdu J-20 and the Shenyang J-31 Falcon Hawk.

Those planes’ designers, Chengdu Aircraft Industry Group and Shenyang Aircraft Corporation, are subsidiaries of the Aviation Industry Corporation of China, or AVIC, a state-owned enterprise.

According to ZDNet, the hackers faced few challenges in accessing the Australian defense contractor’s system. The company was small, with a one-person IT department and lackluster security measures. The attacker reportedly had access to the company’s network for at least three months.

About the Author
By David Z. Morris
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.