The French navy is the latest victim of the highly disruptive Conficker worm.
The worm forced the navy to voluntarily cut network connectivity to stop the worm from spreading on its Intramar network last month. Web browsing and email messaging on the network were disrupted, and some users were forced to rely on more conventional means of communication such as the phone, fax or postal system, navy spokesman Jerome Erulin told the Ouest-France newspaper.
The French navy could not be reached immediately for comment on this story.
Reports indicate that the worm was probably introduced when an infected USB drive was plugged into a computer on the network, probably by a soldier who was working from home. One of the ways Conficker has spread is by infecting things like flash drives and cameras and then copying itself onto PCs when they are plugged in.
The worm can also spread throughout a local area network, but it is usually blocked from jumping to other networks by firewall software, which has kept it from becoming much more widespread.
Erulin told Agence France Presse that the infection had first been detected on 12 January, nearly three months after Microsoft issued an emergency Windows patch for the vulnerability that Conficker exploits.
He disputed a report in Intelligence Online that the worm had grounded the French navy's Rafale fighter jets, saying the worm did not affect operational systems. "The operational networks are much more secure," he told AFP.
The French navy isn't the only organisation that didn't patch its systems in advance of the Conficker outbreak. Security experts believe the worm has infected more than 10 million computers worldwide, and it is reported to have infected low-level systems within the British military.
Find your next job with techworld jobs