The Nuclear Power Corporation of India Limited has admitted that one of its computers have been attacked by malware. Although they have not named the Kudankulam nuclear power plant in its statement, it has mentioned that the victim computer was only used for administrative purposes and was not connected to the main control system.
The authorities at the Kudankulam Nuclear Power Project in Tamil Nadu issued a statement denying the speculation of a cyber incident at the power plant. R. Ramdoss, training superintendent and information officer at KKNPP (Kudankulam nuclear power plant), issued a statement This is to clarify Kudankulam Nuclear Power Project and other Indian Nuclear Power Plants’ control systems are not connected to the outside cyber network and the Internet. Any cyber-attack on Nuclear Power Plant Control System is not possible.”
The admission of the Dtrack attack on India’s largest nuclear power plant – Kudankulam Nuclear Power Project comes a day after KKNPP issued a statement strongly denying these claims.
DTrack, is used by hackers to attack financial and research centers in India. It’s earlier version ATMDtrack was designed to hack the ATMs in India.
Pukhraj Singh, a cyber threat intelligence analyst who has worked with the government and global security teams, claimed on social media that Kudankulam Nuclear Power plant was under an attack. Pukhraj Singh claimed that the threat was identified by a third party, which contacted him and he informed the concerned government body on 4th September.
A K Nema, the associate director of NPCIL said, “Identification of malware in NPCIL system is correct. The matter was conveyed when it was noticed by them.
AK Nema further stated, “The matter was immediately investigated by the specialists. The investigation revealed that the infected PC belonged to a user who was connected in the internet-connected network used for administrative purposes. All the networks are being monitored.” He also confirmed that the plant systems are not affected.
from NEWS – Tollywood https://ift.tt/2PENbwm
0 Comments