German nuclear power plant finds malware on its systems

Fears of terrorist cyber-attack on nuclear facilities grow

A nuclear power plant in Germany has been infected by malware designed to give hackers remote access to its systems.

The Gundremmingen power station, north-west of Munich, is run by the German utility RWE. According to media reports, two strains of viruses, W32.Ramnit and Conficker were discovered at the facility's B unit in a computer system retrofitted in 2008.

In a statement, the firm said these systems were used for "data processing and visualisation and part of the fuel assembly loading machine".

The malware was also discovered on 18 removable data drives, mainly USB sticks, and computers isolated from the plant's operating systems. It is unknown how the malware got onto the systems in the first place.

Advertisement
Advertisement - Article continues below

A spokesman told German newspaper Die Zeit that around 1,000 computers had been checked by IT staff at the firm and "no systems important to safety" had been infected.

RWE said it has increased cybersecurity measures in response to this. The power company has also informed Germany's Federal Office for Information Security (BSI), which is investigating the incident.

Tony Berning, senior manager at security firm OPSWAT, said that as attacks become more sophisticated, and digital control systems increase in complexity and levels of automation, it is increasingly difficult to prevent threats from impacting the operation of critical infrastructure.

"As a security measure, most critical infrastructure systems are air-gapped or isolated from external networks. Because of this, portable media is a primary vector for cyber-attack; it is often the only way to transport files to and from secure areas. As key attack vectors for malware, it is extremely important that extra attention is placed on securing the portable media devices that are brought in and out of a secure facility," he said.

Alex Cruz Farmer, VP of cloud at Nsfocus, said this is a "fantastic example of where the Internet of Things, as well as BYOD (Bring Your Own Device) adoption, without the consideration of security has created a huge risk to an organisation.

"Almost every person who walks around today has a USB stick or a device which can be turned into a removable drive - even your iPhone. With businesses now issuing laptops, rather than the traditional desktops, and also more of the worldwide workforces taking their work home with them, means we are, without knowing it, more susceptible to infection," he said.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019