• About
  • Advertise
  • Careers
  • Contact
Monday, March 20, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

It’s official, administrative network at Kudankulam Nuclear Power Plant was infected with DTrack

by Cyber360 News
November 11, 2019
in Security
0
It’s official, administrative network at Kudankulam Nuclear Power Plant was infected with DTrack
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter

The news is shocking, the Kudankulam Nuclear Power Plant (KNPP) that initially denied a malware infection, now admits the security breach.

Yesterday a worrying news made the headlines, the Kudankulam Nuclear Power Plant (KKNPP) was hit by a cyber attack. Some users are claiming on the social media that a piece of the ‘DTrack’ malware has infected the systems at the KKNPP.

The KKNPP is the largest nuclear power plant located at Kudankulam in Tamil Nadu, but personnel at the nuke plant has denied the incident.

The disconcerting aspect of the story is that the KNPP initially declared that its network is safe and that the control room of the nuclear power plant is not exposed online.

Kudankulam nuclear power plant

“Any cyber-attack on the Nuclear Power Plant Control System is not possible,” the statement stated categorically.

The news of the attack was initially spread by a message on Twitter published by Pukhraj Singh:

Pukhraj Singh is a former security analyst for India’s National Technical Research Organization (NTRO), he reported that recently a malware was uploaded to VirusTotal and it is linked to a malware infection at the Kudankulam Nuclear Power Plant.

Now, just two days after rumors of a malware infection at the Kudankulam Nuclear Power Plant circulated on Twitter, the Nuclear Power Corporation of India Ltd (NPCIL) confirmed the incident.

“Identification of malware in NPCIL system is correct,” reads the NPCIL statement.

The NPCIL confirmed that the network at the Kudankulam Nuclear Power Plant was infected with the DTrack’ malware that was created by the North Korea-linked Lazarus APT group.

According to the Nuclear Power Corporation of India Ltd (NPCIL), the analysis of the malware revealed the presence of hardcoded credentials for KNPP’s internal network, suggesting that the power plan was hit by a targeted attack aimed at spreading inside the plant.

The DTrack malware was described by Kaspersky in September as a tool that could be used to spy on the victims and exfiltrate data of interest. The malware supports features normally implemented in remote access trojan (RAT). Below a list of some functionalities supported by the Dtrack payload executables analyzed by Kaspersky:

  • keylogging,
  • retrieving browser history,
  • gathering host IP addresses, information about available networks and active connections,
  • listing all running processes,
  • listing all files on all available disk volumes.

According to NPCIL, the malicious code only infected the administrative network at the plan, plant systems were not affected. The NPCIL also added that the two networks were isolated.

The NPCIL received notification from CERT India on September 4, when the malware was first spotted, then authorities immediately launched an investigation.

This is the first time that malware used by North Korea-linked APT groups hit a critical infrastructure.

Pierluigi Paganini

(SecurityAffairs – KNPP, hacking)



Share On


Cyber360 News

Cyber360 News

Next Post
NCSC Report: U.K. neutralized over 600 cyber attacks this year

NCSC Report: U.K. neutralized over 600 cyber attacks this year

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In