Questions Remain On EDF Hack Of Greenpeace

Trojan

Commenting on the prison sentences handed down to the former members of EDF’s security staff – and a 1.5 million euro fine on his employers – the only surprise is not having seen this sort of trojan-assisted industrial espionage reaching the courts before.

The case of EDF being hit with a severe fine – after a senior official hired an external company to use a trojan to spy on Greenpeace – is notable because the saga started more than five years ago.

According to the various newswire reports, the power generation giant – which runs more than 50 nuclear power stations in France and 8 in the UK – tasked an external company to conduct illegal surveillance on Greenpeace’s then head of campaigns in France, Yannick Jadot.

Thanks to the successful infection of Jadot’s computer, EDF was able to illegally obtain 1,400 documents about the environmental charity’s ongoing campaign against nuclear energy.

While it is good to hear that the French courts have handed down actual and suspended sentences against former EDF security staff and the detective agency employed by the energy giant, there are some significant questions that remain to be answered.

These include the possibility of incursions into the computers of other senior members of Greenpeace’s staff, how long it was before the infections were detected and how they were spotted.

And then there is the confidential court testimony that was released by a French Web site – Mediapart – two years ago, that revealed that EDF had organised surveillance not only of Greenpeace in France, but broadly across Europe since 2004.

The really big question is how many other cases of trojan-assisted industrial espionage have been carried out in recent years, especially since the external company hired by EDF are said to have relatively simple techniques to infect the Greenpeace chief’s computer.

And it’s worth noting that the same French court handed down a six-month prison sentence and 4,000 euro fine to the external company that EDF used – in connection with infecting computers at a French anti-doping lab – allegedly on behalf of disgraced US cycling star Floyd Landis.

So what do these two cases tell us? Quite simply that trojan-assisted infections are almost certainly an integral part of the modern-day private detective’s IT arsenal when conducting industrial espionage.

The most worrying question is whether terrorists are also using the same techniques to assist their campaigns. I suspect the answer is yes, meaning that IT security professionals now need to take action against the use of trojans to harvest information from the machines under their protection.

SHARETweet about this on TwitterShare on LinkedInShare on FacebookShare on Google+Pin on PinterestDigg thisShare on RedditShare on TumblrShare on StumbleUponEmail this to someone

Philip Lieberman, the founder and president of Lieberman Software, has more than 30 years of experience in the software industry. In addition to his proficiency as a software engineer, Philip is an astute entrepreneur able to perceive shortcomings in existing products on the market, and fill those gaps with innovative solutions. He developed the first products for the privileged identity management space, and continues to introduce new solutions to resolve the security threat of privileged account credentials. Philip has published numerous books and articles on computer science, has taught at UCLA, and has authored many computer science courses for Learning Tree International. Philip has a B.A. from San Francisco State University.