HomeCyber BalkansFrench Government Investigating Recent Malware Attack

French Government Investigating Recent Malware Attack

Published on

spot_img

The recent malware attack in France has sparked a thorough investigation by the French government, uncovering a significant compromise of approximately 3,000 machines within the country. This attack, part of a larger botnet operation affecting millions worldwide, has raised alarm bells about cybersecurity just as France gears up to host the upcoming Olympic Games.

The discovery and initial response to the malware attack began with a report from Sekoia, a cybersecurity firm, highlighting the presence of the PlugX malware on numerous systems. The PlugX malware, categorized as a Remote Access Trojan (RAT), enables attackers to execute arbitrary commands and steal data from infected machines. The Tribunal De Paris Justice report revealed that the malware spread primarily through infected USB drives, with Sekoia’s analysts successfully identifying and taking control of a command and control (C2) server orchestrating the botnet.

This C2 server was responsible for issuing commands to the infected machines, which numbered in the millions globally. In France alone, 3,000 machines were compromised, receiving instructions from the C2 server and impacting nearly 100,000 other victims on a daily basis. The severity of the situation prompted immediate action to address the threat and disinfect the affected machines.

Sekoia, in collaboration with the Centre de Lutte contre les Criminalités Numériques (C3N) of the National Gendarmerie, developed a remote disinfection solution to cleanse the infected machines of the PlugX malware. The disinfection operation commenced on July 18, 2024, with hundreds of machines successfully cleaned within hours of initiation, primarily in France. The operation also extended to other countries, including Malta, Portugal, Croatia, Slovakia, and Austria, showcasing the global impact of the cybersecurity threat.

By the end of 2024, French victims of the malware attack will receive individual notifications from the Agence Nationale de la sécurité des systèmes information (ANSSI) as mandated by law. These coordinated efforts for disinfection highlight the importance of swift and decisive action in the face of cyber threats, underlining the necessity for robust cybersecurity measures.

The significance of cybersecurity measures was emphasized by Prosecutor Laure Beccuau and the Paris Prosecutor’s Office, stressing the critical need for up-to-date antivirus software and preventive measures to protect against sophisticated cyber threats. Sekoia’s provision of technical indicators related to the malicious network aims to empower professionals to enhance their defenses against future cyberattacks and mitigate risks posed by similar malware.

As France prepares to host the Olympic Games, the recent malware attack investigation underscores the vigilance and preparedness of national and international cybersecurity stakeholders. The collaborative efforts between private firms, law enforcement agencies, and international partners demonstrate a united front against cybercriminal activities, ensuring the security of digital infrastructure and the safety of citizens and international visitors during the high-profile event.

In conclusion, the meticulous investigation of the malware attack in France and the subsequent response efforts highlight the critical importance of cybersecurity in an increasingly digitized world. The visual representation of cybersecurity experts analyzing malware serves as a poignant reminder of the ongoing battle against cyber threats, underscoring the need for continuous vigilance and preparedness in the face of evolving cybersecurity challenges.

Source link

Latest articles

North Korean Hackers Target Crypto Firms Using ClickFix and Zoom Tactics

A recently released report from Arctic Wolf has unveiled a significant cyber theft campaign...

BlueNoroff Launches Fileless PowerShell Attack in AI-Driven Zoom Phishing Campaign

In a sophisticated cyber campaign, the North Korean state-sponsored group known as BlueNoroff has...

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...

Cybersecurity Professionals Feel Underappreciated

Growing Dissatisfaction Among Cybersecurity Professionals: A Call for Recognition and Support A recent report by...

More like this

North Korean Hackers Target Crypto Firms Using ClickFix and Zoom Tactics

A recently released report from Arctic Wolf has unveiled a significant cyber theft campaign...

BlueNoroff Launches Fileless PowerShell Attack in AI-Driven Zoom Phishing Campaign

In a sophisticated cyber campaign, the North Korean state-sponsored group known as BlueNoroff has...

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...