“No more throttle”, “System hacked”, “What’s happening? ". On board the Griffon, the Army's multi-role armored vehicle, the red lights flash. Audible alarms go off, screens no longer respond. And the vehicle stops suddenly. It was hacked. “Okay for the group, we are going to disembark, the vehicle is immobilized, we have lost control.”
The Griffon was the victim of a cyberattack. This is of course a simulation which is part of the DEFNET exercise, which takes place from March 18 to 29 throughout France and organized by the Ministry of the Armed Forces and COMCYBER. The objective of this annual exercise: to train the armed forces to react in the event of a cyber attack.
“The threat exists,” says General Bonnemaison, commander of cyber defense. In reality, our systems are already well protected. So to attack us, an opponent will have to take a lot of time. This is not within everyone's reach, it is not classic cybercrime. It is often states that hide behind this threat.”
Also read France Travail cyberattack: how hackers managed to steal the data of millions of people
During this week, 30 simultaneous incidents were simulated. Ranging from compromise to attacks, including attempted intrusions or exfiltration of personal or sensitive data. In total, 15,000 cyber fighters were mobilized.
“Today what was important to show you is the specificity in the military world, when cyber directly affects the availability of our equipment and show you how a cyber attack can have a concrete impact on the battle,” continues the general.
Second part of the exercise after the Griffon attack, the intervention of the GIC, the Cyber Intervention Group. The objective is to identify the fault, correct it and put the Griffon back in working order. The GIC is capable of intervening very quickly, in any terrain, in France or abroad. “For us, this has not yet happened, we have not suffered a cyber attack of this magnitude,” says General Bonnemaison. But with the development of technology, the arrival of artificial intelligence, which can help attackers, we must prepare and protect ourselves.” The report on this simulated cyber attack can be found at the top of the article.