{"id":30274,"date":"2024-09-10T09:10:00","date_gmt":"2024-09-10T07:10:00","guid":{"rendered":"https:\/\/www.arc-data-shield.fr\/?p=30274"},"modified":"2024-10-01T17:47:37","modified_gmt":"2024-10-01T15:47:37","slug":"cyberattaque-en-allemagne-necessite-dun-cloisonnement-fort","status":"publish","type":"post","link":"https:\/\/www.arc-data-shield.fr\/en\/cyberattaque-en-allemagne-necessite-dun-cloisonnement-fort\/","title":{"rendered":"Cyberattack in Germany: the need for strong compartmentalization"},"content":{"rendered":"<p><\/p>\n\n\n\n<p>On September 1, the German Air Navigation Service (DFS) was the victim of a cyber attack targeting its internal communications system. Although air traffic was not affected and the consequences appear to be limited for the time being, this attack has highlighted a critical vulnerability. The pro-Russian hacker group APT 28, suspected of being behind the attack, is known for its cyber espionage activities, with alleged links to Russian military intelligence (GRU).<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"406\" height=\"377\" src=\"https:\/\/www.arc-data-shield.fr\/wp-content\/uploads\/2024\/09\/avion-3.jpg\" alt=\"\" class=\"wp-image-30276\" style=\"width:240px;height:auto\" srcset=\"https:\/\/www.arc-data-shield.fr\/wp-content\/uploads\/2024\/09\/avion-3.jpg 406w, https:\/\/www.arc-data-shield.fr\/wp-content\/uploads\/2024\/09\/avion-3-300x279.jpg 300w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/><\/figure>\n\n\n\n<p>This incident highlights <strong>the need for a strict partitioning system<\/strong> between critical infrastructures and office systems. Such a separation would better protect vital air traffic control functions from malicious intrusion, by limiting access to sensitive systems and minimizing the risk of an attack spreading. By reinforcing these barriers, it would be possible to prevent more serious consequences, such as the disruption of air traffic or the exfiltration of sensitive data.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-controle-aerien-allemand-pirate-un-cybergang-russe-soupconne-94641.html\">https:\/\/www.lemondeinformatique.fr\/actualites\/lire-controle-aerien-allemand-pirate-un-cybergang-russe-soupconne-94641.html<\/a><\/p>\n\n\n\n<p>Credits : <em><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-controle-aerien-allemand-pirate-un-cybergang-russe-soupconne-94641.html\" data-type=\"link\" data-id=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-controle-aerien-allemand-pirate-un-cybergang-russe-soupconne-94641.html\">The computer world<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Le 1er septembre, les services allemands de la navigation a\u00e9rienne (DFS) ont \u00e9t\u00e9 victimes d&rsquo;une cyberattaque ciblant leur syst\u00e8me de communication interne. Bien que le trafic a\u00e9rien n&rsquo;ait pas \u00e9t\u00e9 affect\u00e9 et que les cons\u00e9quences semblent limit\u00e9es pour l&rsquo;instant, cette attaque a mis en lumi\u00e8re une vuln\u00e9rabilit\u00e9 critique. Le groupe de hackers pro-russes APT 28, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":30275,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-30274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commonnews"],"_links":{"self":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/30274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/comments?post=30274"}],"version-history":[{"count":1,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/30274\/revisions"}],"predecessor-version":[{"id":30277,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/posts\/30274\/revisions\/30277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media\/30275"}],"wp:attachment":[{"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/media?parent=30274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/categories?post=30274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arc-data-shield.fr\/en\/wp-json\/wp\/v2\/tags?post=30274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}