The French Navy says it was infected by the Conficker worm, according to reports A highly disruptive Internet worm has claimed a new victim: the French navy.The worm, known as Conficker, forced the navy to voluntarily cut network connectivity to stop the worm from spreading on its Intramar network last month. Web browsing and email messaging on the network were disrupted, and some users were forced to rely on more conventional means of communication such as the telephone, fax or postal system, navy spokesman Jerome Erulin told the Ouest-France newspaper (in French). The French navy could not be reached immediately for comment on this story.Reports indicate that the worm was probably introduced when an infected USB drive was plugged into a computer on the network, probably by a soldier who was working from home. One of the ways Conficker has spread is by infecting things like flash drives and cameras and then copying itself onto PCs when they are plugged in. The worm can also spread throughout a local area network, but it is usually blocked from jumping to other networks by firewall software, which has kept it from becoming much more widespread.Erulin told Agence France Presse (AFP, in French) that the infection was first detected on Jan. 12, nearly three months after Microsoft issued an emergency Windows patch for the vulnerability that Conficker exploits. He disputed a report in Intelligence Online that the worm had grounded the French navys Rafale fighter jets, saying the worm did not affect operational systems. “The operational networks are much more secure,” he told AFP.The French navy isn’t the only organization that didn’t patch its systems in advance of the Conficker outbreak. Security experts believe the worm has infected more than 10 million computers worldwide, and it is reported to have infected low-level systems within the British military. Related content news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Security feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe