{"id":26469,"date":"2019-03-29T15:42:16","date_gmt":"2019-03-29T15:42:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29986\/F-35-Has-Easy-To-Hack-Combat-Systems-Old-Flaws-And-Cost-A-Mint.html"},"modified":"2019-03-29T15:42:16","modified_gmt":"2019-03-29T15:42:16","slug":"f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/","title":{"rendered":"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint"},"content":{"rendered":"<p>The F-35 aircraft remains woefully unprepared against malware infections and other cyber-attacks, according to POGO \u2013 the respected non-profit watchdog Project on Government Oversight.<\/p>\n<p>Dubbed the most expensive weapon system in history, the beleaguered fighter jet is plagued with problems, including a lack of protection against software nasties that would cripple its critical systems, it is claimed. Cybersecurity protections are particularly important because the aircraft relies so heavily on a network of automated systems to operate properly, we&#8217;re told.<\/p>\n<p>&#8220;The fully integrated nature of all F-35 systems makes cybersecurity more essential than for any other aircraft,&#8221; POGO&#8217;s Dan Grazier <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.pogo.org\/investigation\/2019\/03\/f-35-far-from-ready-to-face-current-or-future-threats\/\">noted this month<\/a>, having obtained documentation that the jet has low &#8220;fully mission capable&#8221; rates. That&#8217;s military jargon meaning it&#8217;s rarely fully ready for combat.<\/p>\n<p>&#8220;Legacy aircraft already in service are equipped with software-enabled subsystems, and while a hacker could penetrate the GPS system in a legacy system, because the subsystems are not fully integrated, a hacker could not also access the communications system, for example,&#8221; Grazier continued. &#8220;The F-35 is inherently far more vulnerable.&#8221;<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/01\/18\/andy_edgell_raf_f35_test_pilot.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Sqn Ldr Andy Edgell, lead RAF test pilot, F-35 trials\"><\/p>\n<h2 title=\"Naturally we demanded proof \u2013 and we got it\">F-35 &#8216;incomparable&#8217; to Harrier jump jet, top test pilot tells <em>El Reg<\/em><\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/01\/18\/f35_uk_test_pilot_interview_sim_flight\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Most worryingly, a <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.documentcloud.org\/documents\/5000528-GAO-Cybersecurity-Report-2018.html\">report in October<\/a> from the US government&#8217;s General Accountability Office found the Department of Defense had failed to protect the software used to control the F-35&#8217;s weapons systems. Testers could take control of weapons with &#8220;relatively simple tools and techniques.&#8221;<\/p>\n<p>To give you an idea of how the interconnected nature of the F-35&#8217;s computer systems is a massive vulnerability in of itself: separate subsystems, such as the Active Electronically Scanned Array radar, Distributed Aperture System, and the Communications, Navigation, and Identification Avionics System, all share data. Thus, the GAO&#8217;s auditors warned, just compromising one of these components could bring down the others.<\/p>\n<p>\u201cA successful attack on one of the systems the weapon depends on can potentially limit the weapon\u2019s effectiveness, prevent it from achieving its mission, or even cause physical damage and loss of life,\u201d said the GAO team.<\/p>\n<h3 class=\"crosshead\"><span>ALIS in crazyland<\/span><\/h3>\n<p>POGO&#8217;s Grazier also noted the <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.lockheedmartin.com\/en-us\/products\/autonomic-logistics-information-system-alis.html\">Autonomic Logistics Information System<\/a> (ALIS) \u2013 a network of on-board gear, and ground-based web-browser-accessed systems, that serve as the primary remote diagnostics and management tools for the planes \u2013 continues to harbor a number of security vulnerabilities that have been known of for years, and not yet resolved.<\/p>\n<p>Should one of those ALIS flaws be exploited by miscreants, Grazier warned, the tech-heavy F-35s could end up crippled by deliberately falsified instrument readings as a result of that exploitation, or grounded for bogus repairs \u2013 ALIS is used to schedule maintenance and order spare parts. One flaw, identified in 2012, would incorrectly report aircraft as unfit for service, and has yet to be fixed over six years later.<\/p>\n<p>&#8220;As in previous years, cybersecurity testing shows that many previously confirmed F-35 vulnerabilities have not been fixed, meaning that enemy hackers could potentially shut down the ALIS network, steal secret data from the network and onboard computers, and perhaps prevent the F-35 from flying or from accomplishing its missions,&#8221; Grazier wrote.<\/p>\n<p>As for penetration testing of the ALIS system, Uncle Sam dropped the ball, the independent watchdog suggested. Rather than unleash a DoD red team of hackers on the code, the US government paid F-35 manufacturer Lockheed Martin to do it, and just accepted the results. Such hands-off regulation <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/03\/26\/737_crash_update\/\">didn&#8217;t work out so great<\/a> for Boeing and America&#8217;s aviator regulator, the FAA.<\/p>\n<p>ALIS, right now on software version 27, has other problems, too. The code is basically supposed to automatically detect any problems developing in the fighter jets well ahead of time, and arrange for repairs and spare parts so the planes can be fixed up before they have to be grounded for substantial work. Lockheed designed it this way to save time and money, with constantly updated databases of spare parts, logistics plans, and aircraft testing records \u2013 yet a <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.documentcloud.org\/documents\/5736009-FY2018-DOT-E-F35-Report.html#document\/p8\/a483617\">report<\/a> from the Pentagon last year said inputting information about repairs into ALIS often took longer than the repairs themselves.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/06\/07\/f35b_uk_landing_raf_marham.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"One of the UK's new F-35Bs touches down at RAF Marham after its transatlantic flight. Pic: Crown copyright\/MoD\"><\/p>\n<h2 title=\"2021 maturity deadline gets GAO hot under the collar\">Britain&#8217;s new F-35s arrive in UK as US.gov auditor sounds reliability warning klaxon<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/06\/07\/f_35s_arrive_raf_marham_us_gao_reliability_report\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>POGO&#8217;s findings are the latest bit of bad news for an F-35 program that has fallen hopelessly behind schedule thanks to a parade of delays, glitches, and manufacturing nightmares that have driven what was once supposed to be a low-cost next-generation fighter into a <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/23\/f35_price_will_reduce_claims_exec\/\">$122m per unit<\/a> expense. That&#8217;s just the per-plane price tag: each one costs $30,000 an hour to fly, plus upgrade costs, and other expenditures.<\/p>\n<p>In addition to the US, UK, and Australia, the militaries of Israel, Japan, Canada, and Italy have all been named as customers for the final toys.<\/p>\n<p>This isn&#8217;t the first time software problems have been reported in the F-35. Last year <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/30\/f35_dote_report_software_snafus\/\">reports surfaced<\/a> that the onboard code for a number of the various systems on the plane had become so incompatible with one another that they hampered the ability for manufacturers to perform flight tests. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7143\/cloud-security-from-start-point-to-end-point?td=wptl1810\">Cloud Security: From Start Point to End Point<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29986\/F-35-Has-Easy-To-Hack-Combat-Systems-Old-Flaws-And-Cost-A-Mint.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26470,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6305],"class_list":["post-26469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusaflawcyberwarmilitary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-29T15:42:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint\",\"datePublished\":\"2019-03-29T15:42:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/\"},\"wordCount\":858,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg\",\"keywords\":[\"headline,government,usa,flaw,cyberwar,military\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/\",\"name\":\"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg\",\"datePublished\":\"2019-03-29T15:42:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,flaw,cyberwar,military\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusaflawcyberwarmilitary\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/","og_locale":"en_US","og_type":"article","og_title":"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-29T15:42:16+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint","datePublished":"2019-03-29T15:42:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/"},"wordCount":858,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg","keywords":["headline,government,usa,flaw,cyberwar,military"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/","url":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/","name":"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg","datePublished":"2019-03-29T15:42:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/f-35-has-easy-to-hack-combat-systems-old-flaws-and-cost-a-mint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,flaw,cyberwar,military","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusaflawcyberwarmilitary\/"},{"@type":"ListItem","position":3,"name":"F-35 Has Easy-To-Hack Combat Systems, Old Flaws, And Cost A Mint"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26469"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26469\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26470"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}