Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/15/2015
04:55 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

In Wake Of Violence, France Reports Spike In Cyberattacks

19,000 French websites have been attacked since Jan. 7.

Since the deadly shootings in Paris Jan. 7, cyber attackers have hit 19,000 French websites, mostly with denials of service. Admiral Arnaud Coustilliere, head of cyberdefense for France's military, said today "that's never been seen before. This is the first time that a country has been faced with such a large wave."

The targets vary widely -- everything from military regiments to pizza shops, according to the Associated Press. The perpetrators, however, are mainly well-known Islamic extremist hacking groups -- including the Middle East Cyber Army, Fallaga team, and Cyber Caliphate, the group that took responsibility for hijacking some American organizations' Twitter accounts this week.

"I think what we're seeing in France is more or less natural escalation of cyberwarfare by non-organized groups of cyber-militia," says Guy Levy-Yurista, senior vice president at MicroStrategy. "While impressive in terms of scale, it's not surprising ... It's the next logical step in this overall cat-and-mouse game."

Levy-Yurista says that these attacks do not demonstrate the sophistication -- neither the tools nor the talent -- of nation-states and organized terrorist groups.

This flood of attacks may be unprecedented, but it is not the first time that cyberattacks have boomed during times of sociopolitical upheaval. Researchers from FireEye found a spike in malware traffic leading up to the intense conflicts between the Ukraine and Russia in March.

DarkReading spoke to Kenneth Geers, senior global threat analyst for FireEye at the time when the research was released. Geers theorized that nation-states may use malware to gather intelligence while planning a possible military maneuver:

'You can find cyber operations that will tip you off to something coming, a pending attack,' he says. 'Cyber activity is usually a reflection of real-world activity. You have to inform each with some knowledge of the other. Cyber war, for lack of a better term, is part of the landscape now.'

The widespread DDoS attacks in France this week differ in that they were reactive, not preliminary -- capitalizing on the killings at French satire magazine Charlie Hebdo after they happened. It would be interesting to find out if there was any spike in info-stealing malware preceding the events.

"When there is a real-world attack happening somewhere, then following on its heels we will see cyberattacks as a second wave," says Levy-Yurista. He suggests focusing not just on how and when attacks occur, but why. "What is the real impact on human life? ... What is the goal? The goal may not be to limit access in France ... I think the goal is to show prowess of the terrorists and instill terror literally in the hearts and minds of the people."

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/19/2015 | 3:53:33 PM
Re: In Wake Of Violence, France Reports Spike In Cyberattacks
I agree. The fact that cyberattacks have no physical boundaries are the main reason making it impossible to stop or prevent from. DDoS is not something we can prevent from, unless we are ready to make good amount of investment with the risk of no ROI.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/19/2015 | 3:48:45 PM
Re: Methods of Infiltration
It is more like denial of service to the regular users rather than malware infection I would think. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/19/2015 | 3:47:28 PM
Cyberattacks or regular traffics
 

I am just wondering if they are really DoS attacks or unexpected increase to normal traffic to the sites and French web sites are not ready to handle that much traffic. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/19/2015 | 3:46:21 PM
Cyberattacks and real-world activity
 

"Cyber activity is usually a reflection of real-world activity"

That may be true but, in my view there is nothing out of ordinary when cyberattcaks following a terrorist attack. When is the best time to course most disruption? It is the time making information not available when it is most needed. People go to those web sites and they could not reach the information needed, and bad guys win.
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
1/18/2015 | 9:24:14 PM
Re: In Wake Of Violence, France Reports Spike In Cyberattacks

"...DDoS can be just a precursor to even more sinister attacks that can elevate to the level of the attack on Sony."

 

@GonzSTL    I like your points.   And I agree - it does seem as if DDoS attacks are just a precursor to larger efforts.

Technocrati
50%
50%
Technocrati,
User Rank: Ninja
1/18/2015 | 9:20:15 PM
Re: In Wake Of Violence, France Reports Spike In Cyberattacks

Warfare will never be the same.   Forever more it looks like cyber hits are here to stay.

GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
1/16/2015 | 9:44:43 AM
In Wake Of Violence, France Reports Spike In Cyberattacks
This comes as no surprise, really. Think about countries with limited military power, who wish to inflict harm on another country. They know that a military incursion would be suicidal or even impractical, so how else can they inflict widespread harm? DDoS cyber attacks have virtually no physical boundaries or obstacles to cross, and are not really that difficult to orchestrate. This phenomenon is not limited to those countries, as we have seen militant organizations do exactly the same thing. One of their probable goals is to inflict as much harm as possible to the economic infrastructure of their target, in addition to instilling terror in the populace. I don't believe the attacks on France are a onetime event; I believe these attacks will be more prevalent in the near future, and will only increase in intensity and sophistication, and have catastrophic results for the targets. DDoS can be just a precursor to even more sinister attacks that can elevate to the level of the attack on Sony.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/16/2015 | 8:44:23 AM
Methods of Infiltration
What are the most prevalent methods that have infiltrated these sites? In terms of attacks and malware.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11498
PUBLISHED: 2020-04-02
Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistenc...
CVE-2020-11499
PUBLISHED: 2020-04-02
Firmware Analysis and Comparison Tool (FACT) 3 has Stored XSS when updating analysis details via a localhost web request, as demonstrated by mishandling of the tags and version fields in helperFunctions/mongo_task_conversion.py.
CVE-2020-7628
PUBLISHED: 2020-04-02
install-package through 1.1.6 is vulnerable to Command Injection. It allows execution of arbitrary commands via the device function.
CVE-2020-7629
PUBLISHED: 2020-04-02
install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
CVE-2020-7630
PUBLISHED: 2020-04-02
git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument.