Sponsored by: Investment Center

Something new in your business?  Click here to submit your business press release

Chamber Corner | Main Street News | Job Hunt | Classifieds | Calendar | Illinois Lottery 

EXCLUSIVE

France's Snecma targeted by hackers: researcher

Send a link to a friend 

[February 19, 2014]  By Jim Finkle

BOSTON (Reuters) — French aerospace engine maker Snecma, a unit of Safran, was attacked by hackers who exploited a vulnerability in Microsoft Corp's Internet Explorer, according to a computer security researcher.

It was not clear how successful the hackers had been in their efforts to breach Snecma's network, according to the researcher, who has studied malicious software and infrastructure used by the hackers.

A spokeswoman for Snecma's parent, Safran, said she had no immediate comment.

The researcher said the malicious software used by the hackers contained code that identified Internet domain names belonging to Snecma. The researcher declined to be identified by name as he was not authorized to publicly discuss the matter.

The vulnerability in Internet Explorer surfaced last week, when California-based cybersecurity firm FireEye Inc said that hackers had leveraged a previously unknown security flaw in the Web browser to attack the website of the U.S. nonprofit group Veterans of Foreign Wars.


Microsoft last week advised customers to upgrade to Internet Explorer 11, saying versions 9 and 10 were vulnerable to the type of attacks identified by FireEye.

On Tuesday, the Israeli cybersecurity firm Seculert said in a blog post that the IE vulnerability was used to attack a French aerospace company, though it did not name that company. Seculert said the attack likely began on January 17 and that it may still be going on. (http://bit.ly/1e4TjAf)

According to Seculert, the attack on the aerospace company involved a different piece of malicious software than what was used against the Veterans of Foreign Wars, which suggested a different group of hackers may be involved.

[to top of second column]

The malware was designed to help hackers steal credentials by infecting devices that employees, partners and third-party vendors used to remotely access the French company's network, according to Seculert.

That technique of targeting remote users has been deployed in some high-profile cyber attacks in recent years.

Target Corp said hackers behind a massive data breach late last year had gained initial access to the U.S. retailer's network through a vendor.

In 2011, hackers attacked Lockheed Martin Corp and other U.S. military suppliers by creating duplicate SecurID credentials used by contractors to access their networks. (http://reut.rs/1geuy7r)

(Additional reporting by Tim Hepher in Paris; editing by Tiffany Wu)

[© 2014 Thomson Reuters. All rights reserved.]

Copyright 2014 Reuters. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
 

< Recent articles

Back to top