The FIC Observatory, co-moderated by the National Gendarmerie, CEIS and the Nord-Pas de Calais Regional Council, is a platform to reflect and exchange views throughout the year.

It ensures a permanent watch on all the themes addressed during the conferences and round tables.



Exercise : Switzerland attacked by Anonymous hackers

ATMs are down, banks’ websites are inaccessible, the rail network is frozen and a chemical plant exploded. This is the work of Anonymous. These hackers want Switzerland to reveal names of all tax evaders and to give them 2 billion Swiss francs. All this is the content of the scenario of a strategic defense exercise against a massive cyber attack that would be conducted against Switzerland for political reasons. These strategic crisis management exercises are held every four years and cover all government departments.

Source : bk.admin.ch


Chinese hackers who breached Google gained access to sensitive data

U.S. officials say Chinese hackers who breached Google’s servers in 2010 had gained access to a sensitive database with years’ worth of information about American surveillance targets. The hackers aimed at discovering which intelligence operatives were under surveillance, which probably resulted in them destroying files, get people out of the country or feeding the U.S. misleading information. Back then, Google did not mention the breach of the database because of a dispute between Google and the FBI.

Source : WashingtonPost


A cyber attack conducted through PDF documents attached to e-mails

Cybersecurity company ESET uncovered a cyberattack designed for stealing sensitive information from different organizations. The threat appears to be of Indian origin and has been raging for a couple of years at least. Attackers would use a code signing certificate issued by a company based in New Delhi, apparently legitimate, which would have produced malicious binary signatures and promoted their spread. The malware spreads through e-mail attachments. The attack is mainly directed towards Pakistan, where 79% of detections were identified. The Indian armed forces seem to be one of the most covered topics, as evidenced by a fraudulent PDF files in a self-extracting archive called “pakistandefencetoindiantopmiltrysecreat.exe”. Stolen data from infected computers is sent to the servers of the attackers without encryption, quite surprisingly.

Source : GlobalSecurityMag


Trend Micro uncovers worldwide cyberspying campaign

Trend Micro’s security researchers uncovered an ongoing cyberspying operation, that they called SafeNet. The attacks related to the campaign resulted in the potential infection of thousands of computers from firms, administrations, universities or other organisations in more than a hundred countries all around the world. The five most attacked countries are India, the USA, China, Pakistan, Philippines and Russia. The IP addresses communicating with the C&C servers were based in several countries, yet mostly China and Hong-Kong.

Source : Le Monde Informatique


The NSA releases classified hacking manual

The NSA was requested by the FOIA to release a guide advising its cyberagents over how to conduct internet research. The document called “Untangling the Web, A Guide to Internet Research”, formerly classified, explains how to gather confidential data accidentally released online. The pieces of advice given in this report, although not innovative, do constitute an elementary guide of cyberspying, now available to anyone.

Source : Wired


Smartphone users underestimate the issue of smartphones security

Consumer Reports, the American equivalent of French UFC-Que Choisir, said in its annual report that smartphones are a source of many problems that remain ignored by consumers. Thus, the majority of respondents did not think about the security of their mobile phones unlike their computers. 5.6 million of Americans have had problems ranging from SMS to unauthorized hacking of their bank accounts and 1% of respondents said they had been harassed by tracking lease during the year 2012.

Source : Demainlaveille


Pentagon revives war of smartphones through the issues of certification

The DoD (Department of Defense) plans to open its mobile fleets of new terminals and no longer limit it to Blackberry. This decision is bad news for the Canadian manufacturer RIM, previously in favorable position. The certification is an important issue for businesses as reflecting an image of security can earn market shares, if the Pentagon considers a smartphone capable of being used in its services, it will be equally important for businesses.

Source : online.wsj


Chinese Hackers Infiltrate US Army Database, Compromise Safety Of Thousands Of Dams

Supposedly Chinese hackers have gained access to a confidential military database, gathering information about thousands of American dams, including their vulnerabilities. From January to April, an unauthorized individual traced back to China accessed the US Army Corps of Engineers’ National Inventory of Dams, raising concerns over their safety. With such data, launching a cyberattack against the American powergrid appears feasible, and would cause considerable damage for the United States.

Source : ibitimes


France provides €150 million for digital technologies

Minister for SMEs, Innovation and Digital Economy, Fleur Pellerin, and the Investment Commissioner, Louis Gallois, announced Friday (April 26, 2013) the launch of a dedicated action to support “strategic technologies” industry, the digital technologies. This will be accompanied by a budget of € 150 million that will be allocated to four areas: embedded software and connected devices, security of information systems, HPC technologies and simulation, Cloud computing and Big Data.

Source : Challenges


2013 French Defence White Paper : cyberdefence and intelligence made national priorities

As expected, the 2013 French Defence White Paper confirms cyberdefense as a national priority and paves the way for developing cyberwarfare capabilities. It is stated that any large cyberattack will be considered an act of war by France. A centralised chain of command under military supervision will be in charge of developing offensive capabilities, the defensive capabilities remaining an interministerial prerogative. The 2013 Defence White paper aims for autonomy in the production of security systems, considers reinforcing staff and announces the creation of an operational reserve for cyberdefense.

Source : Challenges