{"id":54366,"date":"2023-10-30T02:30:06","date_gmt":"2023-10-30T02:30:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/"},"modified":"2023-10-30T02:30:06","modified_gmt":"2023-10-30T02:30:06","slug":"lockbit-alleges-it-boarded-boeing-stole-sensitive-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/","title":{"rendered":"LockBit alleges it boarded Boeing, stole &#8216;sensitive data&#8217;"},"content":{"rendered":"<p><span class=\"label\">Security In Brief<\/span> Notorious ransomware gang LockBit has reportedly exfiltrated \u201ca tremendous amount of sensitive data from aerospace outfit Boeing.<\/p>\n<p>VX underground <a target=\"_blank\" href=\"https:\/\/twitter.com\/vxunderground\/status\/1718243288287764803\" rel=\"noopener\">published<\/a> a screenshot of Lockbit\u2019s announcement, and threat to expose data if Boeing does not engage with it by November 2nd.<\/p>\n<p>Boeing has <a target=\"_blank\" href=\"https:\/\/www.foxbusiness.com\/markets\/boeing-looking-into-hacking-gangs-ransomware-threat\" rel=\"noopener\">told<\/a> US media it is investigating Lockbit\u2019s claims.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>If Lockbit has indeed stolen Boeing data the repercussions could be enormous as the company does plenty of work for military clients, and is even building the new pair of heavily\u2014modified 747-8 planes that will serve as the next Air Force One US presidential transports.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>&#8220;We are assessing this claim&#8221;, Boeing told <em>The Register<\/em>.<\/p>\n<p>Lockbit has a long history of &#8220;success&#8221; with its attacks, and is thought to have <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/06\/14\/lockbit_joint_advisory\/\" rel=\"noopener\">earned<\/a> around $90 million in the USA alone since 2020. The group is not shy and often publicises its exploits, and even its product development efforts.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Reports suggest a LockBit affiliate led this raid, using a zero-day exploit. The criminal gang&#8217;s track record means its claims can&#8217;t be dismissed, but its penchant for publicity means its claims also merit careful consideration.<\/p>\n<p> <em>&#8211; Simon Sharwood<\/em>\n<\/p>\n<h3 class=\"crosshead\">What happens in Vegas &#8230;<\/h3>\n<p>Parents of students in Las Vegas&#8217;s Clark County School District (CCSD) are on edge after receiving emails filled with their children&#8217;s personal information following a breach at the school system earlier this month.&nbsp;<\/p>\n<p>Speaking to local outlet News 3 Las Vegas, one parent who received an email titled &#8220;CCSD leak&#8221; on Wednesday <a href=\"https:\/\/news3lv.com\/news\/local\/some-ccsd-families-worried-after-receiving-email-from-california-school-district-with-pictures-private-info-about-their-children\" rel=\"nofollow\">reported<\/a> a warning that their child&#8217;s information had been released online, along with a trio of PDF files containing &#8220;my children&#8217;s pictures, all of their contact information, email addresses, student ID numbers, my information, our address,&#8221; the parent said. &#8220;That is so scary.&#8221;&nbsp;<\/p>\n<p>It wasn&#8217;t made clear in the report whether the sender demanded a ransom of any kind, but that might not be necessary. As we need not remind readers, PDF files are <a href=\"https:\/\/www.theregister.com\/2019\/04\/19\/pdf_malware_warning\/\">frequently used to smuggle malware<\/a> to unsuspecting targets \u2013 and what better way to get someone to open a malicious document than threatening their children&#8217;s safety?<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>CCSD <a href=\"https:\/\/newsroom.ccsd.net\/message-regarding-compromised-email-account\/\" rel=\"nofollow\">reported<\/a> the breach to parents and staff on October 16, 11 days after it first detected an intrusion in its email environment. CCSD claimed the cyber criminal(s) behind the intrusion &#8220;accessed limited personal information related to a subset of students, parents, and employees,&#8221; and said it was in the process of notifying everyone affected.&nbsp;<\/p>\n<p>Technical details of CCSD&#8217;s email environment are not known, but the district locked down access to its Google Workspaces after reporting the intrusion, forcing password resets for all staff and students and restricting access to district Gmail and Google Drives from outside its own network.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.databreaches.net\/exclusive-clark-county-school-district-student-data-begins-to-leak-ccsd-doesnt-comment\/\" rel=\"nofollow\">According<\/a> to DataBreaches, extensive data from the district was published on a file sharing site this week, but has since been taken down. Along with personal email and demographic data on 25k district graduates, disciplinary records, health data, internal communications, district financial information and other data was all reportedly part of the leak, some of which DataBreaches was able to verify.<\/p>\n<p>CCSD didn&#8217;t respond to questions from <em>The Register<\/em>, as it&#8217;s closed for a long weekend.&nbsp;<\/p>\n<div class=\"boxout\" readability=\"14.975463794135\">\n<h3 class=\"crosshead\">Critical vulnerabilities of the week<\/h3>\n<p>Mozilla released patches for Firefox (<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2023-45\/\" rel=\"nofollow\">desktop<\/a> and <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2023-48\/\" rel=\"nofollow\">iOS<\/a> v.119 and <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2023-46\/\" rel=\"nofollow\">ESR<\/a> v.115.4) and <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2023-47\/\" rel=\"nofollow\">Thunderbird<\/a> were released this week to address a number of issues, including rendering queues allowing websites to clickjack users and a cross-site scripting vulnerability in reader mode for Firefox on iOS.&nbsp;<\/p>\n<p>Google also patched a <a href=\"https:\/\/chromereleases.googleblog.com\/2023\/10\/stable-channel-update-for-desktop_24.html\" rel=\"nofollow\">pair<\/a> of security issues in Chrome, including one rated as &#8220;high&#8221; without an accompanying CVSS number. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-5472\" rel=\"nofollow\">CVE-2023-5472<\/a> affects Chrome versions prior to 118.0.5993.117 and allows a remote attacker to exploit heap corruption via a crafted HTML page thanks to a use after free vulnerability in Chrome profiles.&nbsp;<\/p>\n<p>Elsewhere:<\/p>\n<ul>\n<li>CVSS 9.8 \u2013 <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-vman-sc-LRLfu2z\" rel=\"nofollow\">Multiple CVEs<\/a>: Cisco Catalyst SD-WAN Manager contains multiple independent vulnerabilities of varying severity that could allow an attacker to cause denial of service.<\/li>\n<\/ul>\n<ul>\n<li>CVSS 9.8 \u2013 <a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-23-299-07\" rel=\"nofollow\">Multiple CVEs<\/a>: Multiple models of Sielco PolyEco 1000, 500 and 300 FM transmitters are vulnerable to a series of issues allowing an attacker to escalate privileges and hijack sessions.<\/li>\n<li>CVSS 9.8 \u2013 <a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-23-299-08\" rel=\"nofollow\">Multiple CVEs<\/a>: Like the above, session hijacking vulnerabilities were also found in a series of analog FM transmitters and radio link equipment from Sielco.&nbsp;<\/li>\n<li>CVSS 8.2 \u2013 <a href=\"https:\/\/www.cisa.gov\/news-events\/ics-medical-advisories\/icsma-23-194-01\" rel=\"nofollow\">Multiple CVEs<\/a>: Several components of BD&#8217;s Alaris infusion pump software are affected by a series of vulnerabilities that could allow an attacker to modify firmware, hijack sessions, steal data, and the like.<\/li>\n<li>CVSS 8.1 \u2013 <a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-23-299-06\" rel=\"nofollow\">CVE-2023-46290<\/a>: Rockwell Automation&#8217;s FactoryTalk Services Platform v.2.74 contains an improper authentication issue caused by &#8220;inadequate code logic&#8221; that could allow an attacker to gain access to vulnerable systems.&nbsp;<\/li>\n<\/ul>\n<\/div>\n<h3 class=\"crosshead\">CISA asks Congress not to cut its budget<\/h3>\n<p>The US Cybersecurity and Infrastructure Security Agency is in a good place right now, its executive assistant director for cybersecurity Eric Goldstein told congress this week, before warning a proposed 25 percent cut to its budget would be &#8220;catastrophic.&#8221;&nbsp;<\/p>\n<p>&#8220;Right now, we are at the point where we have reasonable confidence and our visibility into risks facing federal agencies,&#8221; Goldstein <a href=\"https:\/\/cyberscoop.com\/cisa-budget-cuts-catastrophic\/\" rel=\"nofollow\">said<\/a>. &#8220;We would not be able to sustain that visibility with that significant of a budget cut, and our adversaries would unequivocally exploit those gaps.&#8221;<\/p>\n<p>The 25 percent gutting was submitted as an <a href=\"https:\/\/amendments-rules.house.gov\/amendments\/CISA%20Amendment%20FINAL230922131149912.pdf?_gl=1*1qayeje*_ga*OTg1OTUwOTIxLjE2MzUzNDAzMDU.*_ga_N4RTJ5D08B*MTY5NTkxODczOS4xLjEuMTY5NTkxODc1NC4wLjAuMA\" rel=\"nofollow\">amendment<\/a> [PDF] to the Department of Homeland Security budget <a href=\"https:\/\/rules.house.gov\/bill\/118\/hr-4367\" rel=\"nofollow\">proposal<\/a> for 2024, and was ultimately <a href=\"https:\/\/clerk.house.gov\/Votes\/2023445?Page=2\" rel=\"nofollow\">rejected<\/a> late last month \u2013 though the move could be attempted again.<\/p>\n<p>CISA has become a bugbear for right-wing Republicans who&#8217;ve accused it of suppressing free speech due to its role in combating election misinformation \u2013 which allegedly involved it acting as a &#8220;switchboard&#8221; for moderation requests to social media platforms. CISA has since been <a href=\"https:\/\/www.theregister.com\/2023\/10\/04\/cisa_barred_from_coordinating_with\/\">barred from coordinating with social media sites<\/a> by a court decision, which it has appealed.<\/p>\n<h3 class=\"crosshead\">Six princes \u2013 er, cyber criminals, arrested in Nigeria<\/h3>\n<p>The Nigerian Police Force (NPF) has dismantled a &#8220;sophisticated cyber crime syndicate&#8221; operating a recruiting and mentoring hub out of the nation&#8217;s capital of Abuja, complete with six arrests and just as many confessions.&nbsp;<\/p>\n<p>The accused confessed to varying degrees of involvement in identity theft, hacking and trading of compromised Facebook accounts, romance scams, computer-related forgery and other computer-related fraud punishable under Nigerian cyber crime laws, Nigerian police said in a <a href=\"https:\/\/twitter.com\/PoliceNG\/status\/1717201993859490231\" rel=\"nofollow\">press release<\/a> published on X this week.&nbsp;<\/p>\n<p>Further intelligence reports indicate the group has &#8220;deep involvement&#8221; in higher-profile cyber crimes like business email compromise and high-yield investment fraud. The investigation is ongoing, NPF said, and the six arrested suspects won&#8217;t be charged until the investigation is complete.&nbsp;<\/p>\n<p>&#8220;Efforts to apprehend the fleeing members of this criminal network are underway,&#8221; according to NPF, suggesting the gang is bigger than its six imprisoned members \u2013 though it wouldn&#8217;t say how many people it&#8217;s still looking for.&nbsp;\u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2023\/10\/30\/security_in_brief\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ALSO: CISA begs for a consistent budget, Las Vegas school breach; Nigeria arrests six cyber princes, the week&#8217;s critical vulnerabilities Security In Brief\u00a0 Notorious ransomware gang LockBit has reportedly exfiltrated \u201ca tremendous amount of sensitive data from aerospace outfit Boeing.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-54366","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LockBit alleges it boarded Boeing, stole &#039;sensitive data&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LockBit alleges it boarded Boeing, stole &#039;sensitive data&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-30T02:30:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"LockBit alleges it boarded Boeing, stole &#8216;sensitive data&#8217;\",\"datePublished\":\"2023-10-30T02:30:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/\"},\"wordCount\":1142,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/\",\"name\":\"LockBit alleges it boarded Boeing, stole 'sensitive data' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2023-10-30T02:30:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage\",\"url\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LockBit alleges it boarded Boeing, stole &#8216;sensitive data&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LockBit alleges it boarded Boeing, stole 'sensitive data' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/","og_locale":"en_US","og_type":"article","og_title":"LockBit alleges it boarded Boeing, stole 'sensitive data' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-30T02:30:06+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"LockBit alleges it boarded Boeing, stole &#8216;sensitive data&#8217;","datePublished":"2023-10-30T02:30:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/"},"wordCount":1142,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/","url":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/","name":"LockBit alleges it boarded Boeing, stole 'sensitive data' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2023-10-30T02:30:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZT9VEiULmm-AZagcxYwanAAAAYI&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alleges-it-boarded-boeing-stole-sensitive-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"LockBit alleges it boarded Boeing, stole &#8216;sensitive data&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54366"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54366\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}