06:20 PM
Connect Directly

Windows Worm Didn't Ground French Planes, Official Claims

The planes had been grounded following a Conflicker worm infection that had spread last month throughout the French nonsecured internal naval network called Intramar.

French navy officials suspect than an infected USB drive is to blame for a Conflicker/Downandup worm infection last month that interfered with the operation of naval logistics systems running Microsoft Windows.

But a French defense ministry spokesperson has denied reports that the worm grounded French navy jets, as claimed in The Telegraph and several French publications.

Citing a French intelligence publication, Intelligence Online, The Telegraph in the United Kingdom reported on Saturday that the Rafale, a plane used in the French navy, had been grounded following a Conflicker worm infection that had spread last month throughout the French nonsecured internal naval network called Intramar. The worm supposedly interfered with French navy's ability to transfer flight data to its planes.

In October, Microsoft issued an out-of-band Security Bulletin, MS08-067, for a vulnerability affecting its Server service. It warned that the vulnerability was "potentially wormable." As Microsoft feared, the vulnerability was wormable and the worm that was released, known as Conflicker or Downandup, and its variants, affected at least 9 million PCs last month.

According to French newspaper Ouest France, the worm's impact on Intramar forced the French navy to "return to conventional means of communication such as telephone, fax, or regular mail" while the infection was mitigated.

Jerome Erulin, a spokesperson for the French navy, said the incident served as an exercise and that it affected communication but resulted in no data loss.

And in keeping with a long tradition of Anglo-Gallic rivalry, Ouest France observed, "The only consolation for the [French] navy is that it is not alone in facing such problems." Its report notes that DefenseTech.org last month said that the U.K. Ministry of Defense had begun investigating what appeared to be a major worm-driven breach affecting over 24 RAF bases and 75% of Royal navy ships."

The Telegraph, in its article on the French security incident, reported the finger-pointing of the French press without comment.

Besides the Conflicker/Downandup worm infection, what other security threats are deemed most serious? InformationWeek polled more than 400 business technology professionals to find out. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.