Japan's Defense Ministry is investigating the possible theft of technical details from a proposal concerning a missile designed by Mitsubishi Electric. Reuters says that details of the cyber espionage are sparse, but that the data stolen probably included certain performance specifications. The report adds that the missile won't be produced: Mitsubishi Electric didn't get the contract.
Researchers at Broadcom's Symantec unit are attributing attacks on South Asian telecommunications companies to Greenbug, an espionage group associated with Iran, and thought to be connected to the group responsible for Shamoon. CyberScoop reports that most of the activity was directed against Pakistan's telecommunications system. Telcos are attractive targets because of the value of the data they carry; the focus on Pakistan suggests a service with a strong interest in the region.
Sources tell Reuters that Chinese intelligence services were responsible for the easyJet hack that affected some nine-million passengers. The anonymous sources say that the same threat group had tracked travelers before, and was interested in their movements, not in financial gain from credit card theft.
The Jerusalem Post, considering the recent cyberattack on an Iranian port as retaliation for a cyberattack on Israeli water treatment facilities, sees the exchange as typifying a new approach to cyber war: continuous engagement.
Some security advice for military and intelligence professionals: treat beer as a commodity and be content. See Bellingcat for the risk of using the Untappd app to rate brews: you can be tracked. And anyway, Warsteiner, Obolon, Krušovice, Brass Cannon? They're all good.