French Submarine Builder Admits Data-Warfare Breach

French submarine maker DCNS recently claimed it was the victim of economic warfare after an Australian newspaper published more than 22,000 pages of highly detailed information on its Scorpene submarines being built in India.

A DCNS spokeswoman described the leak as potential corporate espionage that could affect the company’s contracts with other governments.

"Competition is getting tougher and tougher, and all means can be used in this context," Reuters quoted the spokeswoman as saying.

The Australian newspaper  published some 22,400 documents containing sensitive information on the technical capabilities of six Scorpene submarines that are being built at a shipyard in Mumbai, India.

According to the newspaper, the documents reveal the intelligence-gathering capabilities of the submarines, their stealth abilities and information pertaining to weapons, combat systems, diving, sensors, navigation, communication and sonar capabilities. The documents are so detailed they contain information like the conditions under which the periscope can be used and the noise levels created by the propeller.

The Australian said that in total it had reviewed over 4,450 pages on the Scorpene’s underwater sensors, another 4,200 or so pages of data on above-water sensors and over 4,300 pages on its combat systems.

In addition, the leaked documents include hitherto secret information on sea trials that the Malaysian Navy is conducting with its fleet of Scorpene submarines, The Australian said. Also leaked were 12 documents pertaining to DCNS radar systems in some Chilean frigates and deals with the Russian government pertaining to amphibious assault vessels.

In a brief statement, the DCNS said it is aware of the leak on the Indian Scorpenes and noted that the appropriate French authorities are currently investigating the breach. “This investigation will determine the exact nature of the leaked documents, the potential damages to DCNS customers as well as the responsibilities for this leakage.”

The Australian has not said how, where, or from whom it received the documents. But it has said the incident raises serious questions about the security of a $38 billion submarine project that the DCNS is currently negotiating with the Australian government.

DCNS itself has apparently hinted that the leak happened in India rather than in France. But information made available to The Australian suggests that a former French naval officer may have removed the data from a system in that country back in 2011 and made it available to a navy in southeast Asia, the paper said.

The DCNS leak is the second one in recent days involving the exposure of highly sensitive material. Earlier, a group calling itself ShadowBrokers released a data tranche containing details of top-secret cyber-weapons apparently developed by the US National Security Agency for use against adversaries.

Among the dozens of tools publicly released were several that targeted zero-day flaws in firewalls from companies like Cisco and Juniper.

Shadow Brokers also put up for auction a second, fully encrypted document that it says contains even more NSA cyber-weapons. The group has said it will release the decryption keys to the highest bidder or make the key publicly available if the auction raises around $550 million.

DarkReading:

 

« For Russian journalists fighting hacks is part of the job
Hedge Fund Robot Outsmarts Master »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Zyber 365

Zyber 365

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.