Wednesday, April 23, 2025
Homecyber securityPentagon IT Service Provider Hacked: U.S. Government Secrets Exposed

Pentagon IT Service Provider Hacked: U.S. Government Secrets Exposed

Published on

SIEM as a Service

Follow Us on Google News

A massive breach in cybersecurity has occurred at Leidos Holdings Inc., which is a key provider of information technology services to the United States government.

Hackers have released internal information, which has raised significant worries regarding the safety of sensitive government data managed by third-party contractors.

During the fiscal year 2022, Leidos secured $3.98 billion in contract commitments, making it the top federal information technology contractor. Leidos is well-known for its substantial work with the Pentagon and other government agencies.

- Advertisement - Google News

The company’s clients include the Department of Defense, the Department of Homeland Security, the National Aeronautics and Space Administration, other agencies from the United States and other countries, and commercial organizations.

87% of Leidos’ revenue comes from contracts with the United States government.

According to the Cyber Press report, data consists of one gigabyte of files in the following formats: zip, msg, doc, jpg, png, xls/x, and pdf. These files are associated with Leidos technical assistance and its customers.

Part one of the data set has 451 files representing credits, and part two contains 6,500 files representing bitcoins or dollars.

Download Free Cybersecurity Planning Checklist 2024 (PDF) – Download Here

The documents disclosed are suspected to have been taken during two breaches that occurred in 2022 at Diligent Corp., a platform Leidos uses.

There is still a lack of clarity regarding the precise type and level of sensitivity of the data that were taken; however, the leak has brought to light vulnerabilities in the cybersecurity frameworks of businesses that manipulate sensitive government information.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Document nature
Document nature


On a site dedicated to cybercrime, the documents that had been leaked were found. Bloomberg News examined some of the files, but they could not verify their legitimacy because the details were disguised.

No information regarding the nature or specifics of these documents has been made available to the general public.

Cyber Press report indicates that Leidos has recently become aware of the problem and is investigating to determine the breach’s scope.

Therefore, the corporation has not yet issued a public comment regarding the particulars of the leaked documents or the actions it is taking to lessen the impact of the document breach. Leidos has chosen not to comment on the information that was stolen publicly.



Concerns regarding the potential misuse of sensitive information have been further exacerbated by the threat actor responsible for the breach’s indication that they intend to sell the data in two distinct categories.

Due to this occurrence, the security standards and precautions that government contractors take have been the subject of a more extensive discussion.

A data breach of this nature can have a wide range of repercussions, including financial losses, damage to reputation, disruptions to operations, and legal issues.

Cybersecurity experts warn that breaches such as this can significantly harm customers’ trust and subject firms to harsh scrutiny from regulators and customers.

Through its information technology services and solutions, Leidos, established in 2013 and later acquired Lockheed Martin Corporation’s information technology business, plays an essential part in protecting the nation’s security.

The latest security breach has forced the organization to take urgent action to determine the extent of the damage and strengthen its defenses against future assaults.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges

Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service,...

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures

A recent security audit has uncovered critical vulnerabilities within Moodle, the widely used open-source...

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges

Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service,...

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures

A recent security audit has uncovered critical vulnerabilities within Moodle, the widely used open-source...

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...