In July 2025, threat actors claimed they accessed sensitive systems at Naval Group, France’s top warship builder. They say they obtained the combat management system (CMS) source code used in submarines and frigates.
What Hackers Claim to Have Stolen
Hackers posted a sample of roughly 13 GB of data online. They assert this includes:
- Full CMS source code and related technical documents
- Internal network maps and VM environments
- Classified messages and developer logs
Attackers are not selling the data. Instead, they are demanding ransom under threat of public release.
Implications for Cybersecurity and Defense
Access to naval CMS code raises national and allied security concerns. If accurate, the breach could:
- Allow adversaries to reverse‑engineer systems
- Undermine confidence in the defense supply chain
- Force urgent code audits and system redesigns
Experts warn that ransom-driven attackers often exaggerate scope to pressure victims. Many leaked files date back to 2003 or earlier, raising questions about their relevance.
Eye World Advisory: Enhancing Cyber Resilience
At Eye World, we believe defense contractors and maritime operators must take proactive steps now:
- Conduct forensic audits of exposed systems and ensure code integrity
- Enforce network segmentation and zero‑trust architecture
- Require multi‑factor authentication and rotate sensitive keys
- Prepare a detailed incident response plan aimed at stakeholders, regulators, and the press
Sharing transparency fosters trust—especially during cyber crises.
Why Eye World Readers Should Care
If your organization handles critical infrastructure, maritime systems, or classified code, this incident is a wake‑up call. A breach at the heart of naval defense signals broader risk: the threat environment is evolving, and even highly secured systems are not immune.
Stay vigilant, audit often, and follow cybersecurity best practices now.