Attacks/Breaches
8/24/2016
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

French Submarine Firm Claims Economic Warfare After Massive Data Leak

The Australian publishes over 22,000 documents on six DCNS Scorpene subs that are being built in India

French submarine maker DCNS this week claimed it was the victim of economic warfare after an Australian newspaper published more than 22,000 pages of highly detailed information on its Scorpene submarines being built in India.

In comments to Reuters Wednesday, a DCNS spokeswoman described the leak as potential corporate espionage that could affect the company’s contracts with other governments.

"Competition is getting tougher and tougher, and all means can be used in this context," Reuters quoted the spokeswoman as saying.

The Australian newspaper earlier this week published some 22,400 documents containing sensitive information on the technical capabilities of six Scorpene submarines that are being built at a shipyard in Mumbai, India.

According to the newspaper, the documents reveal the intelligence-gathering capabilities of the submarines, their stealth abilities and information pertaining to weapons, combat systems, diving, sensors, navigation, communication and sonar capabilities. The documents are so detailed they contain information like the conditions under which the periscope can be used and the noise levels created by the propeller.

The Australian said that in total it had reviewed over 4,450 pages on the Scorpene’s underwater sensors, another 4,200 or so pages of data on above-water sensors and over 4,300 pages on its combat systems.

In addition, the leaked documents include hitherto secret information on sea trials that the Malaysian Navy is conducting with its fleet of Scorpene submarines, The Australian said. Also leaked were 12 documents pertaining to DCNS radar systems in some Chilean frigates and deals with the Russian government pertaining to amphibious assault vessels.

In a brief statement, the DCNS said it is aware of the leak on the Indian Scorpenes and noted that the appropriate French authorities are currently investigating the breach. “This investigation will determine the exact nature of the leaked documents, the potential damages to DCNS customers as well as the responsibilities for this leakage.”

The Australian has not said how, where, or from whom it received the documents. But it has said the incident raises serious questions about the security of a $38 billion submarine project that the DCNS is currently negotiating with the Australian government.

DCNS itself has apparently hinted that the leak happened in India rather than in France. But information made available to The Australian suggests that a former French naval officer may have removed the data from a system in that country back in 2011 and made it available to a navy in southeast Asia, the paper said.

The DCNS leak is the second one in recent days involving the exposure of highly sensitive material. Last week, a group calling itself ShadowBrokers released a data tranche containing details of top-secret cyberweapons apparently developed by the US National Security Agency for use against adversaries.

Among the dozens of tools publicly released were several that targeted zero-day flaws in firewalls from companies like Cisco and Juniper.

Shadow Brokers also put up for auction a second, fully encrypted document that it says contains even more NSA cyberweapons. The group has said it will release the decryption keys to the highest bidder or make the key publicly available if the auction raises around $550 million.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.