Back to Data breach

Data breach

Information on nuclear power plants stolen in a data breach at Ingerop

Ingerop, an engineering company based in France, has fallen victim to a data breach that exposed 65GB worth of sensitive documents on nuclear power plants, prisons, and tram networks. The attack might be linked to Ingerop's association with a nuclear power plant on the France-Germany border that's recently received flak from anti-nuclear activists.

Details of the attack

According to reports issued by German-based public broadcaster NDR on November 2nd, a spokesperson at Ingerop confirmed more than 11,000 files from a dozen projects were exposed in June 2018. These files contained blueprints of a high-security prison, information on a nuclear waste dump in northeastern France, and Ingerop workers' personal information.

Ingerop has notified its stakeholders about the breach and implemented measures to bolster its security. Investigations have revealed that some of the stolen Ingerop data was found on a rented server in the German city of Dortmund. However, there have been no leads on the whereabouts of the perpetrators or the rest of the stolen data.

Don't want to make the news for the wrong reasons? Download ManageEngine Log360, the tool that can help combat internal and external security attacks.

How can ManageEngine help in situations like these?

Log360, our comprehensive SIEM solution, helps organizations:

  • Audit user access to theconfidential data stored in databases.
  • Identifycritical configuration changes in Active Directory in real time.
  • Detect known attacks and attack patterns, such as potential brute force attacks, withpredefined correlation rulesand alert profiles.
  • Leverage threat intelligence to identify whenever a malicious source tries to access the network.
  • Get instant notifications via email for all unauthorized file modificationsand permission changes.
  • Detect previously undiscovered threats with a user behavior-based security ecosystem.

Get started with Log360.

log-management-sql-and-iis-auditing
log-management-real-time-active-directory-change-auditing

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.