Chinese man charged with hack of Boeing, Lockheed Martin aircraft data

Share this article:
Experts say the settlement serves as a small win for plaintiffs, and a bigger one for plaintiffs.
Stephen Su is accused of accessing U.S. firms' systems, including defense contractors Boeing and Lockheed Martin.

A Chinese man, who operated an aviation tech firm with Canadian operations, has been charged with hacking a number of U.S. companies for military data, including defense contractors Boeing and Lockheed Martin.

On Saturday, CBC News reported that the FBI filed a complaint against Stephen Su (who also goes by Su Bin and Stephen Subin) on June 27. Su was taken into custody by Canadian police on June 28, the FBI confirmed with the outlet.

From 2009 to 2013, Su and two unnamed citizens of China conspired to hack the computers of the world's largest aerospace firm, Boeing, which is headquartered in Chicago and manufactures commercial jetliners and military aircraft, the complaint said. Targeted Boeing computers and networks were located in Orange County, Calif., prosecutors alleged.

Su owned his own aviation technology firm called Lode-Tech, which maintained an office in Canada, the FBI revealed.

Data of interest to the three individuals included “information related to Boeing's military projects, including the C-17 aircraft…an advanced strategic transport aircraft,” court documents said. Other data allegedly sought by the hackers were files on Lockheed's F-22 and F-35 fighter jets.

Obtained correspondence between the hackers said that the individuals had stolen 65 gigabytes of data from Boeing that was specifically related its C-17 aircraft. Investigators believe that the three conspired to sell the data to the Chinese government.

“In some instances, Su would also seek to sell stolen data obtained by [co-conspirator 1] to entities in the Peoples' Republic of China, including to state-owned companies, for their personal profit,” the complaint said.

Su is expected to appear in court on Friday for his bail hearing.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.