Indian Nuke Plant's Network Reportedly Hit By Malware Tied To North Korea 31
North Korea is reportedly behind a cyberattack on India's Kudankulam Nuclear Power Plant. "The malware, identified by researchers as North Korea's Dtrack, was reported by [former analyst for India's National Technical Research Organization (NTRO) Pukhraj Singh] to have gained 'domain controller-level access' at Kudankulam," reports Ars Technica. "The attack has been reported to the government." From the report: The attack likely did not affect reactor controls, but it may have targeted research and technical data. The attack apparently focused on collection of technical information, using a Windows SMB network drive share with credentials hard-coded into the malware to aggregate files to steal. Dtrack was tied to North Korea's Lazarus threat group by researchers based on code shared with DarkSeoul, a malware attack that wiped hard drives at South Korean media companies and banks in 2013.
Singh alluded to the attack in a September 7 tweet, in which he wrote, "I just witnessed a casus belli in the Indian cyberspace and it sucks at every level." He said that he did not discover the intrusion himself but learned of it from "a third party." Singh passed on the information to India's National Cyber Security Coordinator on September 4, and the third party shared the indicators of compromise "over the preceding days." Kaspersky later identified the malware involved as Dtrack, Singh said. Officials at Kudankulam have said that the plant is safe from cyber attack because the control systems network is isolated from the plant's administrative networks, but they have not addressed what data may have been stolen.
Singh alluded to the attack in a September 7 tweet, in which he wrote, "I just witnessed a casus belli in the Indian cyberspace and it sucks at every level." He said that he did not discover the intrusion himself but learned of it from "a third party." Singh passed on the information to India's National Cyber Security Coordinator on September 4, and the third party shared the indicators of compromise "over the preceding days." Kaspersky later identified the malware involved as Dtrack, Singh said. Officials at Kudankulam have said that the plant is safe from cyber attack because the control systems network is isolated from the plant's administrative networks, but they have not addressed what data may have been stolen.
So it's connected to the internet? WTF? (Score:2)
Re: (Score:1)
Re: (Score:2)
It's like people having their security cameras inside their house on the Internet. It doesn't make sense.
Sure it does. With my cameras connected, I can check them if a motion detector is triggered when I am not home. When I am home, why should I care if the NSA watches me slicing tomatoes in the kitchen?
Re: (Score:2)
When I am home, why should I care if the NSA watches me slicing tomatoes in the kitchen?
That one wouldn't work for me. Mine would be more like:
When I am home, why should I care if the NSA watches me slicing corpses in the kitchen?
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
If you are going through that trouble,
What trouble? Installing an IoT camera takes about two minutes.
why not use a private line to a private security firm instead?
Why do I buy a $30 camera instead of spending thousands to hire a security firm?
I don't know, maybe because I am not totally retarded.
Re: (Score:2)
Re: (Score:1)
Its NOT. Learn to Read (Score:2)
The article clearly says the attack vector was a USB stick.
Re: (Score:1)
The were probably trying to put latest Bollywood movie into their common shared folder, from where everybody would just watch in office or copy to their own USB Stick to watch at home for families! What they did not know was the movie file was a .exe, with movie name and icon of that movie's screenshot! And when you double click it, it opens an inbuilt video player and does play the movie! .....
Me: I avoid exe's like the plague they are, and I run Linux on my home desktop and laptop. Last Virus infection wa
Re: (Score:2)
Idiocy to connect this to a public network. But why is North Korea still attached to the network? Pull the plug on that connection once and for all. There is no right for a nation to be on the internet.
Re: (Score:2)
Well, there's a couple of answers to this that occur to me.
One is that, much like with other means of getting information into their country like Radio Free Asia, I think there is hope and at least a small chance that Internet into NK is promoting ideas about freedom and democracy there. Information wants us to be free. Or something like that.
But the more relevant one in this particular case is that nowhere in the article does it say that attacks originated from ***NK IP addresses*** - and frankly that woul
Launch a nuke, launch a nuke! (Score:2)
C'mon, don't be a coward! Hit them back! Nuke them, nuke them, nuke them!
Ok, I'm done trying to rile up the entertainment.
Nuke Seattle (Score:3)
Microsoft is responsible for this poor security. Nuke Seattle
Re: (Score:1)
Insert yet more neocon BS (Score:1)
"The attack likely did not affect reactor controls"
Doh, just who in their right mind would use Microsoft Windows to control a nuclear pile?
Re: (Score:3)
like they say, RTFA, it was the administrative network, control network is airgaped and not infected.
Re: (Score:2)
Pakistan (Score:3)
Pakistan and North Korea have had long cooperation. Most of Pakistan's long range missiles are rebranded North Korean ones and the NK nuke program has been helped a lot by the Pakis. Maybe the NKs gave the Pakis some Cyber weapons
Re: (Score:2)
Maybe you look too much like us for us to mistake you as one of us??
Just kidding... Apologies for my warmhearted brothers!
And sometimes they have been through so much and still able to smile, it's because they have this humanity ingrained from childhood, and they just want to share the same connections with the rest of the world. Especially my Sikh brothers - the ones with Turban and thick beards!
Re: WTF? (Score:2)
Possibly nothing; they just want to extort some Bitcoin as a source of funds, and will infect anything they can in order to do so. The hackers might not even know what theyâ(TM)ve hacked into.
Re: (Score:2)
They were targeting research data.