April 28, 2024 21:57 (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
'Not joining any other party': Arvinder Singh Lovely after resigning as Delhi Congress chief | Bus carrying 36 people erupts in flames in Mumbai-Pune Expressway, all passengers safe | Amid Congress' Amethi indecision, Robert Vadra says 'Entire country wants me to join politics' | Arrested Delhi CM Arvind Kejriwal's wife Sunita Kejriwal gets major role in AAP | Two CRPF personnel killed in suspected attack by Kuki militants in Manipur
Nuclear Power Corporation of India Limited admits identification of malware in its system

Nuclear Power Corporation of India Limited admits identification of malware in its system

India Blooms News Service | @indiablooms | 30 Oct 2019, 12:27 pm

Tirunelveli, Oct 30 (UNI) Nuclear Power Corporation of India Limited on Wednesday admitted the identification of ‘malware’ in its system and said the matter was immediately investigated by the specialists of Department of Atomic Energy.

“Identification of malware in NPCIL system is correct. The matter was conveyed by Indian Computer Emergency Response Team (CERT-In) when it was noticed by them on September 4, 2019,” the NPCIL said in a statement in its website, without mentioning the Kudankulam Nuclear Power Plant (KKNPP), whose system was reportedly targeted by the hackers.


The matter was immediately investigated by DAE specialists. The investigation revealed that the infected PC belonged to a user who was connected in the internet connected network used for administrative purposes. This is isolated from the critical internal network. The networks are being continuously monitored.


''Investigation also confirms that the plant systems are not affected,'' the NPCIL claimed.


The clarification came from the NPCIL, a day after blanket denial by KKNPP officials over the tweet of Pukhraj Singh, an independent expert on cyber security, that domain controller-level access at the KKNPP plant had been breached and the extremely mission-critical targets were hit.
R Ramdoss, Training Superintendent and Information Officer of KKNPP said on Tuesday that some false information is being propagated on the social media platform, electronic and print media with reference to the cyber attack on KKNPP.


KKNPP and other Indian Nuclear Power Plants Control Systems are stand alone and not connected to outside cyber network and Internet.
''Any cyber attack on the Nuclear Power Plant Control System is not possible. Presently, KKNPP Unit 1 and 2 are operating at 1,000 MWe and 600 MWe, respectively without any operational or safety concerns,'' he said.


Pukhraj Singh tweeted that “I did not discover the intrusion (malware), a 3rd party did. It contacted me and I notified the National Cyber Security Coordinator on 4th September. The third party then shared the indicators of compromise (IoCs) with the NCSC’s office over the proceeding days. Kaspersky reported it (malware) later, called it DTrack.''


Dtrack was a malware developed by North Korean hackers. It was the same malware which in 2013 wiped hard drives at South Korean media companies and banks.


The KKNPP -- India’s largest civil nuclear power project was envisaged to have six units with total capacity to generate 6,000 MWe of power.
While the Unit 1 and Unit 2 were commissioned in 2013 and 2016 respectively, the construction of Units 3 and 4 was progressing. The construction of Units 5 and 6 were expected to begin next year.  

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.