• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechF-35

Hackers Stole Restricted F-35 Data From an Australian Contractor

By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
October 14, 2017, 3:05 PM ET

Australian and U.S. officials confirmed this week that an unnamed Australian defense firm involved in developing the F-35 fighter jet was hacked in November of 2016. The attackers, who may have been Chinese, stole large amounts of data on the F-35 and other vehicles and munitions.

A spokesman for the F-35 program told Defense News that the breach did not compromise any classified data. However, the data has been described by Australian authorities as commercially sensitive, and as including detailed schematics.

According to ZDNet, which first spotted the revelations in an Australian government report, the compromised data was restricted under the International Traffic in Arms Regulation, which controls the export of military technology from the U.S.

Australian officials have not identified a culprit, but the attack was carried out, in part, using a hacking tool known as “China Chopper.” According to Ars Technica, the tool has been used extensively by Chinese hackers in the past.

Get Data Sheet, Fortune’s technology newsletter.

The theft of defense schematics by the Chinese government or allied forces would fit a disturbing pattern. According to documents released by NSA whistleblower Edward Snowden in 2015, Chinese hackers have already compromised top secret data on the F-35. Experts allege that information has informed the design of Chinese fighter jets including the Chengdu J-20 and the Shenyang J-31 Falcon Hawk.

Those planes’ designers, Chengdu Aircraft Industry Group and Shenyang Aircraft Corporation, are subsidiaries of the Aviation Industry Corporation of China, or AVIC, a state-owned enterprise.

According to ZDNet, the hackers faced few challenges in accessing the Australian defense contractor’s system. The company was small, with a one-person IT department and lackluster security measures. The attacker reportedly had access to the company’s network for at least three months.

About the Author
By David Z. Morris
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

LawElon Musk
Musk misled Twitter investors before 2022 buyout, jury says
By Isaiah Poritz, Jef Feeley and BloombergMarch 20, 2026
51 minutes ago
bespectacled man scratches the back of his head during congressional hearing
CryptoCryptocurrency
Kalshi locks in $22 billion valuation, gaining slight edge over its rival Polymarket
By Carlos GarciaMarch 20, 2026
3 hours ago
Big TechEntrepreneurs
Mark Cuban reads 1,000 emails a day—now he’s using a Mac Mini to fight the AI-generated flood threatening his clean inbox obsession
By Marco Quiroz-GutierrezMarch 20, 2026
5 hours ago
Stressed out job seeker on laptop
Successjob hunting
Job seekers aren’t imagining things: the number of candidates ghosted by employers just reached a three-year high thanks to AI
By Emma BurleighMarch 20, 2026
8 hours ago
SuccessCareers
AI boom is fueling demand for skilled trades—and demand for technicians, HVAC workers, and electricians is soaring, with six-figure salaries to match
By Preston ForeMarch 20, 2026
9 hours ago
LawX
Three Tennessee teenagers are suing Elon Musk’s xAI for creating sexually explicit images of them
By The Associated Press and Travis LollerMarch 20, 2026
9 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.