Attacks/Breaches
11/21/2012
12:21 PM
50%
50%

U.S. Denies Malware Attack Against France

Unnamed French officials accuse the U.S. government of infecting government systems with the Flame espionage malware during French elections.

Did the U.S. government launch a "cyberattaque" against French government computers in the run-up to the 2012 French presidential election?

That allegation was leveled at the U.S. government by unnamed French officials, according to a Tuesday report in the weekly French newspaper L'Express. It reported that computers belonging to top advisers to then French president Nicolas Sarkozy had been hacked using the Flame cyberespionage malware, which was designed to be used in highly targeted attacks.

French officials said that the attacks occurred between April 22, 2012, when the first round of the country's most recent presidential elections was held, and May 6, 2012, when a runoff was held, which resulted in socialist Francois Hollande beating Sarkozy. The officials said the attackers had first conducted reconnaissance using Facebook, "friended" Sarkozy advisers, then sent them phishing emails that led to a fake version of the French government's intranet, which was used to capture the targets' intranet usernames and passwords.

U.S. officials rejected the allegations. "We categorically deny the allegations by unnamed sources that the U.S. government participated in a cyber attack against the French government," said Department of Homeland Security spokesman Matthew Chandler via email. "France is one of our strongest allies. Our outstanding cooperation in intelligence sharing, law enforcement and cyber defense has never been stronger, and remains essential in successfully combating the common threat of extremism."

[ As the Gaza military crisis escalates, so has the response from hackers. See Anonymous Steps Into Gaza Crisis. ]

How reliable are the Flame allegations reported in L'Express? Consider that when Kaspersky Lab first detailed Flame in late May 2012, it said that the malware had been used against Iran (in 189 attacks), Israel and Palestine (98), Sudan (32), Syria (30), Lebanon (18), Saudi Arabia (10) and Egypt (5). But it reported no attacks against French targets.

Another fact that makes the French allegations appear suspect is that in the online realm, accurately attributing attacks to a specific source is incredibly difficult, and any claims to the contrary are typically discounted unless backed by substantial, detailed evidence, produced by a reliable source. L'Express detailed no such evidence. Furthermore, while the command-and-control servers used in attacks may be traced back to a specific country -- such as the United States -- it's easy to rent hosting space or use compromised PCs in that country to launch attacks, thus covering one's tracks and complicating efforts to accurately ascertain attackers' true location or location.

L'Express also published excerpts from its wide-ranging interview with Janet Napolitano, the U.S. secretary of Homeland Security, who was asked directly if the U.S. government had authorized a cyber-espionage campaign against the French government. "Let me answer the following," she said (her comments have been translated from French to English). "We have no more important partner than France, we have no ally greater than France. We cooperate in many areas related to security. And I'm here to further strengthen these links and develop new ones."

Napolitano was also asked if it wasn't ironic that while the United States has been sounding alarms over the growing amount of malware that's targeting U.S. government system, it also commissioning the Stuxnet and Flame cyber-espionage malware used against Iran. Napolitano, however, pled official ignorance. "These programs were never attributed in any way to the U.S. government. Beyond this point, your question presupposes a yes-or-no answer, while my job is to protect the civilian networks using all the technology we have at our disposal. We seek to ensure a high level of security -- the highest possible. To do this, our cybersecurity budget was increased by 40% last year and president's recommendation for the coming year is that it should increase by 75%."

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Maczin
50%
50%
Maczin,
User Rank: Apprentice
11/23/2012 | 2:32:57 PM
re: U.S. Denies Malware Attack Against France
A while ago it has been revealed in the Washington Post: FLAME was developed by the United States and shared with Israel. Security analysts say it was a highly sophisticated malware program. The FLAME windows malware shows why President Hollande should develop a French Operating System based on Linux, as some nations in Asia did. Closed source operating systems are a high risk for national security.
PJS880
50%
50%
PJS880,
User Rank: Ninja
12/10/2012 | 2:57:26 AM
re: U.S. Denies Malware Attack Against France
If the United States decided to hack the French Government, we most likely would not be reading about it. Furthermore if the US was performing reconnaissance I would hope their sources would be more reliable than Facebook. Just because the malware used is specific for high targets, doesn't implicate nor point at the US. Sounds like the french newspaper needed to sell some newspaper, because I haven't read one fact backing their claim.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.