USB Attack Targeting Critical NATO Supplier | DataLocker Inc. 

08.30.22

USB Attack Targeting Critical NATO Supplier

As reported by the BBC, NATO is assessing the impact of a USB data breach of classified military documents being sold by a hacker group. The data includes blueprints from military industrial giant MBDA Missile Systems of weapons used by NATO allies in the Ukraine war. The attack that took place in Italy involved an unsecured external hard drive.

If you are looking for a solution to ensure USB security

  • Select an NCIA (NATO Communications and Information Agency) approved secure USB storage product
  • Ensure that your vendor is not exposed for components or services to Russia and/or China, as these countries are listed as threats to NATO as of 2022. Make no mistake: it’s currently possible to sell FIPS 140-2 level 3 certified products that are de facto Chinese security products at their core. Encryption by western standards contradicts China’s policies, leaving ambiguity as to willingness to submit the openness required to undergo a trustworthy FIPS certification by NIST in the United States
  • Go beyond TAA compliance and make sure that all critical components, such as crypto processors within the products, have a country of origin other than China, Russia, or TAA-denied listed countries

How can DataLocker solve the USB problem?

  • Block unsecured storage with PortBlocker endpoint software
  • Switch to crypto and origin-compliant secure USB data storage
  • Get command and control over all USB usage using SafeConsole central management software, including audit trails, data policy, and lifecycle control

DataLocker meets NATO requirements

  • NCIA approved with products listed
  • All DataLocker critical components and all hardware products are from the Netherlands, Japan, and Taiwan, which are TAA-compliant territories