icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm
30 Oct, 2019 05:02

Indian nuclear power plant refutes major cyber attack rumors, says all critical systems ‘air-gapped & impossible to hack’

Indian nuclear power plant refutes major cyber attack rumors, says all critical systems ‘air-gapped & impossible to hack’

An Indian state nuclear power plant operator issued a carefully worded statement after reports of malware at one of the power plants’ systems snowballed into rumors of a North Korean cyber attack that allegedly crippled a reactor.

“Any cyber attack on the Nuclear Power Plant Control System is not possible,” an information officer for the Kudankulam Nuclear Power Plant (KNPP) stated on Tuesday. Both KNPP’s reactors were operating nominally, he added, emphasizing that all critical systems at KNPP and other plants are “standalone and not connected to outside cyber network and Internet.”

The official statement, however, raised further questions, as many noted it neither confirmed nor denied whether any of the secondary non-critical systems might have been compromised in the alleged breach.

Cybersecurity expert Pukhraj Singh, whose tweets had triggered the avalanche of rumors, followed up with a clarification that he only spoke of an alleged lower level “domain controller” breach, instead of one on “control systems.” A hack on the domain level might affect a public-facing email address linked to the plant, for example, but would not touch its reactors or other sensitive equipment.

The former officer of the National Technical Research Organisation, Singh, also noted that he never said anything about possible culprits, because “false flags are so goddamn easy.”

Panicked rumors and headlines spread like fire after Singh tweeted on Monday that the breach had gone “public,” stating that “extremely mission-critical targets were hit” in the intrusion, which he called a “casus belli in the Indian cyberspace.”

Indian authorities were aware of the potential breach since at least early September, according to Singh who personally filed a report after he was first alerted by a third party. He also cited a report by independent cyber attack monitor VirusTotal, which said a form of malware known as “Dtrack” – which some linked to alleged North Korean hacking outfit, the Lazarus Group – was used against several Indian targets. The report matched an earlier finding by cybersecurity firm Kaspersky, which had detected Dtrack attacking “financial institutions and research centers” in India.

Also on rt.com US has started a cyberwar against Iran that it ‘won’t be able to finish,’ Iranian FM Zarif says

While Indian officials insist no intrusion took place and that the power plant’s systems were “air-gapped” – or totally isolated from other networks – that precaution has failed to stop other high-profile cyber attacks. Stuxnet, a virus developed by Washington (likely with help from Tel Aviv), is believed to have breached air-gapped Iranian nuclear systems in 2010, possibly by way of an infected USB drive.

Since its reactors went online in 2013, the KNPP has encountered some 70 shutdowns, with one reactor temporarily halting operations in mid-October due to faults in its steam generator. While some recalled the issue and quickly linked it to the alleged hack, KNPP officials say the problem was entirely unrelated and since resolved.

Also on rt.com ‘Age of digital terrorism’ is coming, impact may be as dangerous as WMDs – Moscow

Like this story? Share it with a friend!

Podcasts
0:00
27:33
0:00
28:1