From The Hill (11/20/2012; emphasis is mine):
Report: French officials accuse US of hacking Sarkozy's computers
The United States used U.S.-Israeli spy software to hack into the French presidential office earlier this year, the French cyberwarfare agency has concluded, according to the newsmagazine l'Express.
The magazine reported late Tuesday that the computers of several close advisers to then-president Nicolas Sarkozy – including Chief of Staff Xavier Musca – were compromised in May by a computer virus that bears the hallmarks of Flame, which was allegedly created by a U.S.-Israeli team to target Iran's nuclear program. Anonymous French officials pointed the finger at the United States.
“You can be on very good terms with a 'friendly' country and still want to guarantee their unwavering support – especially during a transition period,” an official told the magazine. The alleged spying attack took place a few days before the second round of the French presidential elections, which Sarkozy lost to Francois Hollande, a socialist.
Homeland Security Secretary Janet Napolitano reportedly did not deny the allegations when asked point-blank about them.
“We have no greater partner than France, we have no greater ally than France,” Napolitano reportedly answered, at the opening of an interview with l'Express. “We cooperate in many security-related areas. I am here to further reinforce those ties and create new ones.”
In the interview, Napolitano also said that the Flame and Stuxnet viruses had “never been linked to the U.S. government.”
The White House did not return a request for comment from The Hill.
I remember there was a little noted piece of news earlier this month that the oil giant Chevron admitted that their system was infected with Stuxnet.
From CNET (11/8/2012):
Stuxnet, the sophisticated computer virus that attacked a nuclear enrichment facility in Iran two years ago, also inadvertently infected Chevron's network.
Reportedly created by the U.S. and Israel, the highly destructive worm was designed to infect Iran's Natanz nuclear facility. Rather than steal data, Stuxnet left a back door meant to be accessed remotely to allow outsiders to stealthily knock the facility offline and at least temporarily cripple Iran's nuclear program.
The oil giant discovered the malware in July 2010 after the virus escaped from its intended target, Mark Koelmel, Chevron's general manager of the earth sciences department, told The Wall Street Journal.
"I don't think the U.S. government even realized how far it had spread," he said. "I think the downside of what they did is going to be far worse than what they actually accomplished."
A Chevron spokesperson told CNET that the company's network was not adversely affected by the virus.
"Two years ago, our security systems identified the Stuxnet virus. We immediately addressed the issue without incident," a Chevron representative said.
What does Stuxnet have to do with Flame? It turns out that they share the same source codes, according to Computerworld (6/11/2012):
The two pieces of malware -- Flame for reconnaissance, Stuxnet for attack -- each included a module that appears to originate from the same source code, likely written by a single programmer.
Persistent comments that Fukushima I Nuke Plant was infected by Stuxnet don't seem to take into account, though, that their network system hadn't been quite brought up to speed in the PC era, not advanced enough to get infected.