International news media are reporting today of a successful cyber attack by unknown parties against the French Government that occurred late last year. The incident was first reported by the magazine Paris Match yesterday, which the French government later confirmed.

According to this article in the Financial Times of London, the attack targeted "sensitive information relating to France's presidency of the Group of 20 industrialised nations."

The FT article quotes François Baroin, Budget Minister, as saying the attack had been "spectacular", while this article at the Wall Street Journal states that computer security on 12,000 of the 170,000 workstations used by the French Finance Ministry was increased this past weekend in wake of the attack.

Patrick Pailloux, head of L'Agence nationale de la sécurité des systèmes d'information (National Agency for Information Systems Security) was also quoted by the FT as saying the cyber attack was:

"... pure espionage ... one of the most important attacks, if not the most important, ever to target the public administration."

The attacks apparently began in December of last year, but weren't detected until January of this year. By the time the attacks were detected, at least 150 workstations at the Finance Ministry had been successfully penetrated.

Attempts to gain access to the computers located in the office of French President Nicolas Sarkozy, Prime Minister François Fillon, and the Minister of State failed, however.

The FT states that the workstations were penetrated via a Trojan Horse concealed in a PDF file attached to an email that supposedly came from a known source. The WSJ article says that the malware was detected when an employee at the Finance Ministry noticed an email had been sent to them from someone in the ministry who said they hadn't sent it.

Speculation is that the French Government believes the attack came from China, but is hesitant to say so for fear of losing China's support of France's G20 initiatives.

A few weeks ago, I blogged about Canada's Treasury Board and Department of Finance being hacked. Suspicion fell on China, which the Chinese government strongly denied.

The Conversation (0)

How the FCC Settles Radio-Spectrum Turf Wars

Remember the 5G-airport controversy? Here’s how such disputes play out

11 min read
This photo shows a man in the basket of a cherry picker working on an antenna as an airliner passes overhead.

The airline and cellular-phone industries have been at loggerheads over the possibility that 5G transmissions from antennas such as this one, located at Los Angeles International Airport, could interfere with the radar altimeters used in aircraft.

Patrick T. Fallon/AFP/Getty Images
Blue

You’ve no doubt seen the scary headlines: Will 5G Cause Planes to Crash? They appeared late last year, after the U.S. Federal Aviation Administration warned that new 5G services from AT&T and Verizon might interfere with the radar altimeters that airplane pilots rely on to land safely. Not true, said AT&T and Verizon, with the backing of the U.S. Federal Communications Commission, which had authorized 5G. The altimeters are safe, they maintained. Air travelers didn’t know what to believe.

Another recent FCC decision had also created a controversy about public safety: okaying Wi-Fi devices in a 6-gigahertz frequency band long used by point-to-point microwave systems to carry safety-critical data. The microwave operators predicted that the Wi-Fi devices would disrupt their systems; the Wi-Fi interests insisted they would not. (As an attorney, I represented a microwave-industry group in the ensuing legal dispute.)

Keep Reading ↓Show less
{"imageShortcodeIds":["29845282"]}