In November 2015, ThyssenKrupp, a German industrial conglomerate, faced a sophisticated cyber attack targeting its systems. The attackers aimed to steal highly sensitive technical specifications related to the Royal Australian Navy’s next-generation submarines, involving competitors like TKMS, DCNS, Mitsubishi, and Kawasaki Heavy Industries. While there was no confirmed data breach or successful exfiltration of information, the incident forced the company and its partners to resort to physical hand-delivery of critical documents to mitigate risks. The attack highlighted persistent threats, with ThyssenKrupp reporting 30 to 40 daily intrusion attempts. The lack of clarity on post-incident measures raised concerns about the company’s cybersecurity resilience, though no direct financial, operational, or reputational damage was publicly disclosed. The primary consequence was the disruption of secure digital communication channels, necessitating manual alternatives to safeguard classified defense-related data.
TPRM report: https://www.rankiteo.com/company/thyssenkrupp
"id": "thy355092125",
"linkid": "thyssenkrupp",
"type": "Cyber Attack",
"date": "11/2015",
"severity": "25",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': ['industrial engineering',
'defense',
'steel production'],
'location': 'Germany',
'name': 'ThyssenKrupp AG',
'type': 'corporation'},
{'customers_affected': ['Royal Australian Navy'],
'industry': 'defense (naval systems)',
'location': 'Germany',
'name': 'ThyssenKrupp Marine Systems (TKMS)',
'type': 'subsidiary'},
{'industry': 'defense (naval systems)',
'location': 'France',
'name': 'DCNS (now Naval Group)',
'type': 'partner'},
{'industry': ['defense', 'engineering'],
'location': 'Japan',
'name': 'Mitsubishi Heavy Industries (MHI)',
'type': 'partner'},
{'industry': ['defense', 'aerospace', 'engineering'],
'location': 'Japan',
'name': 'Kawasaki Heavy Industries (KHI)',
'type': 'partner'}],
'data_breach': {'sensitivity_of_data': 'high (Royal Australian Navy submarine '
'technical requirements)'},
'date_detected': '2015-11',
'description': 'In November 2015, ThyssenKrupp experienced a cyber attack in '
'Germany, with 30 to 40 intrusion attempts daily. The attack '
'aimed to steal highly sensitive information about the Royal '
"Australian Navy's technical requirements for its "
'new-generation submarines. While no successful breach was '
'confirmed, the incident forced ThyssenKrupp Marine Systems '
'(TKMS), DCNS, Mitsubishi, and Kawasaki Heavy Industries (HI) '
'to hand-deliver the most sensitive information to ensure its '
"security. The company's response measures remain unclear.",
'impact': {'operational_impact': 'forced secure hand-delivery of sensitive '
'submarine-related documents by TKMS, DCNS, '
'Mitsubishi, and Kawasaki HI'},
'initial_access_broker': {'high_value_targets': ['Royal Australian Navy '
'submarine technical '
'requirements']},
'investigation_status': 'unclear; no confirmed breach but ongoing intrusion '
'attempts reported',
'motivation': 'theft of highly sensitive military/defense information (Royal '
'Australian Navy submarine technical requirements)',
'title': 'Cyber Attack on ThyssenKrupp Targeting Royal Australian Navy '
'Submarine Data',
'type': ['cyber espionage', 'targeted attack']}