Japanese Nuclear Power Plant IT administrator had discovered that a malware based attack infected a system in the reactor control room. They are found stolen private information from the infected machine.
This is found on 2nd January, IT administrator has discovered that the system in the reactor control room had been accessed over 30 times in the last five days after an employee updated a free application on one of the machines in the plant.
This incident confirms that more than 42,000 emails and staff training reports were available on the compromised system at the nuclear power plant.
The infection on one of the facility’s computers is n’t part of a sophisticated cyberattack. Instead, it appears that one of the facility’s employees wanted to update a video playback program.
Investigations are still ongoing, but it seems the system in question was not pivotal to the safety of the plant. The shared-use machine did however contain data including a large amount of employee email and training information which may have been leaked by the compromise.
Monju is a prototype sodium-cooled fast breeder reactor, commissioned in the mid-1990s, but only managed a few months of running before a sodium leak led to a major fire, following which the reactor was shut down for fifteen years.
Security Expert said this is not Stuxnet-style attack and an interesting point regarding cyber security at the Japanese nuclear power plant.
This is found on 2nd January, IT administrator has discovered that the system in the reactor control room had been accessed over 30 times in the last five days after an employee updated a free application on one of the machines in the plant.
This incident confirms that more than 42,000 emails and staff training reports were available on the compromised system at the nuclear power plant.
The infection on one of the facility’s computers is n’t part of a sophisticated cyberattack. Instead, it appears that one of the facility’s employees wanted to update a video playback program.
Investigations are still ongoing, but it seems the system in question was not pivotal to the safety of the plant. The shared-use machine did however contain data including a large amount of employee email and training information which may have been leaked by the compromise.
Monju is a prototype sodium-cooled fast breeder reactor, commissioned in the mid-1990s, but only managed a few months of running before a sodium leak led to a major fire, following which the reactor was shut down for fifteen years.
Security Expert said this is not Stuxnet-style attack and an interesting point regarding cyber security at the Japanese nuclear power plant.
No comments:
Post a Comment