According to US media, at least a dozen of US power plants were breached by hackers in May and June.The New York Times reported that DHS has indicated a foreign power was responsible for the breach.The wolf creek nuclear facility operational Corp which was one of the targets declined to say whether the plant was hacked, but they said there has been “no operational impact” on the plant.The spokesman of DHS said in a joint statement with FBI that there is “no indication of a threat to public safety.”Here breach happened in the corporate network or business associated end at the nuclear plant which is separate from operational computer systems. According DHS reports the hackers tried to map out computer networks for future attacks.Greg Martin, the CEO of cyber security firm JASK said that “ the breach is very severe and scary and it was wonderful that network segmentation prevented hackers from being able to attack critical infrastructure directly”. He also added: “The business side has tons of information about the more vulnerable infrastructure side of these types of plants,” like emails, communications involving design plans, information about security assessments, emails or documents that contain passwords.According to reports, fake job applications with malicious code were sent to the senior engineers at operational firms behind the nuclear firms. US investigators accuse the techniques resemble the Russian-based hacker who caused blackouts across Ukraine in 2015.Cyber security experts say that now the network has been infiltrated the nuclear power plants have become “much more vulnerable.”
Disclaimer:
Secure Reading has no confirmed sources for the information shared in the above news/articles. It relies on various unconfirmed inputs, social media claims, and websites for its content, and cannot guarantee the accuracy, timeliness, and genuineness of the same. If there is any error in the news, and once it is brought up to our attention with relevant evidence, Secure Reading is willing to make necessary corrections as applicable.