November 23, 2024 12:44 (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
'Third World War has begun:' Ex-Ukraine military commander-in-chief Valery Zaluzhny | UK-India Free Trade Agreement negotiations to resume in early 2024 | UK can arrest Benjamin Netanyahu if he visits country based on ICC warrant | Centre to send over 10,000 additional soldiers to violence-hit Manipur amid fresh violence | Chhattisgarh: 10 Maoists killed during encounter with security forces in Sukma
Nuclear Power Corporation of India Limited admits identification of malware in its system

Nuclear Power Corporation of India Limited admits identification of malware in its system

| @indiablooms | 30 Oct 2019, 12:27 pm

Tirunelveli, Oct 30 (UNI) Nuclear Power Corporation of India Limited on Wednesday admitted the identification of ‘malware’ in its system and said the matter was immediately investigated by the specialists of Department of Atomic Energy.

“Identification of malware in NPCIL system is correct. The matter was conveyed by Indian Computer Emergency Response Team (CERT-In) when it was noticed by them on September 4, 2019,” the NPCIL said in a statement in its website, without mentioning the Kudankulam Nuclear Power Plant (KKNPP), whose system was reportedly targeted by the hackers.


The matter was immediately investigated by DAE specialists. The investigation revealed that the infected PC belonged to a user who was connected in the internet connected network used for administrative purposes. This is isolated from the critical internal network. The networks are being continuously monitored.


''Investigation also confirms that the plant systems are not affected,'' the NPCIL claimed.


The clarification came from the NPCIL, a day after blanket denial by KKNPP officials over the tweet of Pukhraj Singh, an independent expert on cyber security, that domain controller-level access at the KKNPP plant had been breached and the extremely mission-critical targets were hit.
R Ramdoss, Training Superintendent and Information Officer of KKNPP said on Tuesday that some false information is being propagated on the social media platform, electronic and print media with reference to the cyber attack on KKNPP.


KKNPP and other Indian Nuclear Power Plants Control Systems are stand alone and not connected to outside cyber network and Internet.
''Any cyber attack on the Nuclear Power Plant Control System is not possible. Presently, KKNPP Unit 1 and 2 are operating at 1,000 MWe and 600 MWe, respectively without any operational or safety concerns,'' he said.


Pukhraj Singh tweeted that “I did not discover the intrusion (malware), a 3rd party did. It contacted me and I notified the National Cyber Security Coordinator on 4th September. The third party then shared the indicators of compromise (IoCs) with the NCSC’s office over the proceeding days. Kaspersky reported it (malware) later, called it DTrack.''


Dtrack was a malware developed by North Korean hackers. It was the same malware which in 2013 wiped hard drives at South Korean media companies and banks.


The KKNPP -- India’s largest civil nuclear power project was envisaged to have six units with total capacity to generate 6,000 MWe of power.
While the Unit 1 and Unit 2 were commissioned in 2013 and 2016 respectively, the construction of Units 3 and 4 was progressing. The construction of Units 5 and 6 were expected to begin next year.  

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.