French Submarine Builder Admits Data-Warfare Breach

French submarine maker DCNS recently claimed it was the victim of economic warfare after an Australian newspaper published more than 22,000 pages of highly detailed information on its Scorpene submarines being built in India.

A DCNS spokeswoman described the leak as potential corporate espionage that could affect the company’s contracts with other governments.

"Competition is getting tougher and tougher, and all means can be used in this context," Reuters quoted the spokeswoman as saying.

The Australian newspaper  published some 22,400 documents containing sensitive information on the technical capabilities of six Scorpene submarines that are being built at a shipyard in Mumbai, India.

According to the newspaper, the documents reveal the intelligence-gathering capabilities of the submarines, their stealth abilities and information pertaining to weapons, combat systems, diving, sensors, navigation, communication and sonar capabilities. The documents are so detailed they contain information like the conditions under which the periscope can be used and the noise levels created by the propeller.

The Australian said that in total it had reviewed over 4,450 pages on the Scorpene’s underwater sensors, another 4,200 or so pages of data on above-water sensors and over 4,300 pages on its combat systems.

In addition, the leaked documents include hitherto secret information on sea trials that the Malaysian Navy is conducting with its fleet of Scorpene submarines, The Australian said. Also leaked were 12 documents pertaining to DCNS radar systems in some Chilean frigates and deals with the Russian government pertaining to amphibious assault vessels.

In a brief statement, the DCNS said it is aware of the leak on the Indian Scorpenes and noted that the appropriate French authorities are currently investigating the breach. “This investigation will determine the exact nature of the leaked documents, the potential damages to DCNS customers as well as the responsibilities for this leakage.”

The Australian has not said how, where, or from whom it received the documents. But it has said the incident raises serious questions about the security of a $38 billion submarine project that the DCNS is currently negotiating with the Australian government.

DCNS itself has apparently hinted that the leak happened in India rather than in France. But information made available to The Australian suggests that a former French naval officer may have removed the data from a system in that country back in 2011 and made it available to a navy in southeast Asia, the paper said.

The DCNS leak is the second one in recent days involving the exposure of highly sensitive material. Earlier, a group calling itself ShadowBrokers released a data tranche containing details of top-secret cyber-weapons apparently developed by the US National Security Agency for use against adversaries.

Among the dozens of tools publicly released were several that targeted zero-day flaws in firewalls from companies like Cisco and Juniper.

Shadow Brokers also put up for auction a second, fully encrypted document that it says contains even more NSA cyber-weapons. The group has said it will release the decryption keys to the highest bidder or make the key publicly available if the auction raises around $550 million.

DarkReading:

 

« For Russian journalists fighting hacks is part of the job
Hedge Fund Robot Outsmarts Master »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Government Communications Headquarters (GCHQ) - UK

Government Communications Headquarters (GCHQ) - UK

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.