• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechF-35

Hackers Stole Restricted F-35 Data From an Australian Contractor

By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
By
David Z. Morris
David Z. Morris
Down Arrow Button Icon
October 14, 2017, 3:05 PM ET

Australian and U.S. officials confirmed this week that an unnamed Australian defense firm involved in developing the F-35 fighter jet was hacked in November of 2016. The attackers, who may have been Chinese, stole large amounts of data on the F-35 and other vehicles and munitions.

A spokesman for the F-35 program told Defense News that the breach did not compromise any classified data. However, the data has been described by Australian authorities as commercially sensitive, and as including detailed schematics.

According to ZDNet, which first spotted the revelations in an Australian government report, the compromised data was restricted under the International Traffic in Arms Regulation, which controls the export of military technology from the U.S.

Australian officials have not identified a culprit, but the attack was carried out, in part, using a hacking tool known as “China Chopper.” According to Ars Technica, the tool has been used extensively by Chinese hackers in the past.

Get Data Sheet, Fortune’s technology newsletter.

The theft of defense schematics by the Chinese government or allied forces would fit a disturbing pattern. According to documents released by NSA whistleblower Edward Snowden in 2015, Chinese hackers have already compromised top secret data on the F-35. Experts allege that information has informed the design of Chinese fighter jets including the Chengdu J-20 and the Shenyang J-31 Falcon Hawk.

Those planes’ designers, Chengdu Aircraft Industry Group and Shenyang Aircraft Corporation, are subsidiaries of the Aviation Industry Corporation of China, or AVIC, a state-owned enterprise.

According to ZDNet, the hackers faced few challenges in accessing the Australian defense contractor’s system. The company was small, with a one-person IT department and lackluster security measures. The attacker reportedly had access to the company’s network for at least three months.

About the Author
By David Z. Morris
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Lists Calendar
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Lists Calendar
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

Kemba Walden served as Acting National Cyber Director of the United States and is President of the Paladin Global Institute.
CommentaryHacking
Former national cyber director: Anthropic’s ‘Mythos’ AI can hack nearly anything and we aren’t ready
By Tristan Bove and Kemba WaldenApril 23, 2026
44 minutes ago
Colin Zima smiles while wearing a pink shirt
NewslettersTerm Sheet
Exclusive: Omni raises $120 million to fix one of AI’s biggest enterprise data problems
By Lily Mae LazarusApril 23, 2026
2 hours ago
Uber riders complain they were charged more for paying with Amex cards—one viral video shows a $13 difference
Personal FinanceUber Technologies
Uber riders complain they were charged more for paying with Amex cards—one viral video shows a $13 difference
By Catherina GioinoApril 23, 2026
2 hours ago
Google's new TPU 8t and TPU 8i custom AI chips. (Photo courtesy Google)
NewslettersFortune Tech
Google rolls out its latest custom AI chips
By Andrew NuscaApril 23, 2026
2 hours ago
Tech leaders, Donald Trump, and Melania Trump sit at a table.
Big TechLobbying
Big Tech is spending $226,000 a day on lobbying Congress, advocacy group finds
By Jacqueline MunisApril 23, 2026
3 hours ago
sony
InnovationRobots
Meet ‘Ace,’ the paddle-wielding robot who just beat humans at ping pong in AI breakthrough
By Matt O'Brien and The Associated PressApril 22, 2026
14 hours ago

Most Popular

‘Something sinister’: What we know about the FBI probe into dead and missing scientists linked to space and military industries
Economy
‘Something sinister’: What we know about the FBI probe into dead and missing scientists linked to space and military industries
By Jim EdwardsApril 22, 2026
1 day ago
The tables have turned: Florida and Texas are the biggest losers in the housing market as Ohio emerges a surprise winner
Real Estate
The tables have turned: Florida and Texas are the biggest losers in the housing market as Ohio emerges a surprise winner
By Sydney LakeApril 21, 2026
2 days ago
'Something sinister could be happening': FBI looks into dead or missing nuclear and space defense scientists tied to NASA, Blue Origin, and SpaceX
Politics
'Something sinister could be happening': FBI looks into dead or missing nuclear and space defense scientists tied to NASA, Blue Origin, and SpaceX
By Catherina GioinoApril 21, 2026
2 days ago
John Ternus, the man stepping into Tim Cook and Steve Jobs' shoes, is a 25-year Apple veteran with zero LinkedIn posts
C-Suite
John Ternus, the man stepping into Tim Cook and Steve Jobs' shoes, is a 25-year Apple veteran with zero LinkedIn posts
By Kelvin Chan and The Associated PressApril 21, 2026
2 days ago
Palantir published a mini manifesto calling some cultures ‘harmful’ and ‘middling’ and said Silicon Valley has ‘a moral debt’ to the U.S.
AI
Palantir published a mini manifesto calling some cultures ‘harmful’ and ‘middling’ and said Silicon Valley has ‘a moral debt’ to the U.S.
By Marco Quiroz-GutierrezApril 22, 2026
1 day ago
$166 billion in tariff refunds just became available, but small businesses may already be at a disadvantage
Law
$166 billion in tariff refunds just became available, but small businesses may already be at a disadvantage
By Sasha RogelbergApril 20, 2026
3 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.