According to reports, the Pentagon has been subject to a successful hacking attack with details of the F35 Lightning II, also known as the Joint Strike Fighter and the most expensive jet fighter ever, the target.

Apparently, design data including that of the $300 billion jet project electronics system, have been stolen. Several terabytes of data in all are said to have been successfully stolen from a computer system that deals with in-flight maintenance fault diagnosis. Insiders say that the attacks have originated in China, but this has unsurprisingly been ferociously denied by Chinese government officials. A spokesman for the Chinese foreign ministry told the Telegraph newspaper that "China has always been against hacking and we have cracked down very hard on hacking." While the Chinese Embassy in Washington said it was all "a product of the Cold War mentality" designed to inflame political opinion against China. Certainly China has something of a history when it comes to allegations of cyber espionage.

However, whoever was behind the hack may have got some useful material that could, in theory, make it easier to defend against attacks by the plane they have not got any data on the most sensitive areas of the F35 as these are all held on computers with no physical connection to the Internet. It is believed that the attackers got hold of the data they did manage to steal by exploiting network vulnerabilities through a number of contractors working on the project.

As Editorial Director and Managing Analyst with IT Security Thing I am putting more than two decades of consulting experience into providing opinionated insight regarding the security threat landscape for IT security professionals. As an Editorial Fellow with Dennis Publishing, I bring more than two decades of writing experience across the technology industry into publications such as Alphr, IT Pro and (in good old fashioned print) PC Pro. I also write for SC Magazine UK and Infosecurity, as well as The Times and Sunday Times newspapers. Along the way I have been honoured with a Technology Journalist of the Year award, and three Information Security Journalist of the Year awards. Most humbling, though, was the Enigma Award for 'lifetime contribution to IT security journalism' bestowed on me in 2011.

Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.