North Korean virus Dtrack targets nuclear plant in Kudankulam - what we know so far

North Korean virus Dtrack targets nuclear plant in Kudankulam - what we know so far

IANSUpdated: Thursday, October 31, 2019, 11:17 AM IST
article-image
Photo by ANI

New Delhi: After first denying any malware attack, the Nuclear Power Corporation of India (NPCIL) on Wednesday confirmed the presence of malware in its system at the Kudankulam nuclear plant, which has been traced to North Korea's Dtrack.

In a press statement, the NPCIL said "identification of malware in NPCIL system was correct" but added that the "infected PC" belonged to a user "who was connected in the internet connected network used for administrative purposes".

It said the infected PC "has been isolated from the critical internal network" and that the "networks are being continuously monitored".

It added: "Investigation also confirms that the plant systems are not affected".

Earlier, in the statement, it said that the matter was conveyed by CERT-in (Indian Computer Emergency Response Team, an office within the Ministry of Electronics and Information Technology) when they noticed it on September 4.

"The matter was immediately investigated by DAE (Department of Atomic Energy) specialists," the statement said.

The NPCIL is a body under the DAE, which in turn comes under the purview of the prime minister's office.

According to Zednet, Pukhraj Singh, a former security analyst for India's National Technical Research Organization (NTRO), pointed out that a recent VirusTotal upload was actually linked to a malware infection at the Kudankulam Nuclear Power Plant.

The particular malware sample included hardcoded credentials for KNPP's internal network, suggesting the malware was specifically compiled to spread and operate inside the power plant's IT network.

Several security researchers identified the malware as a version of Dtrack, a backdoor trojan developed by the Lazarus Group, North Korea's elite hacking unit.

Singh's tweet and revelation immediately went viral because just days before, the same power plant had an unexpected shutdown of one of its reactors -- with many users conflating the two unrelated incidents as one.

In a press statement on Tuesday, the NPCIL had denied any malware attack.

It said that "false information was being circulated" on the social media platform, electronic and print media on a malware attack on the Kudankulam plant.

It said that KNPP and other Indian Nuclear Power Plants Control Systems are "stand alone and not connected to outside cyber network and internet".

"Any cyber attack on the Nuclear Power Plant Control System is not possible", it said, and added that Kudanklam Unit 1 and 2 "are operating without any operational or safety concerns".

Arstechnica.com, quoting Kaspersky Lab said, said in a recent article on Dtrack: "North Korea's hermit government has developed a new strain of malware that steals data used at automatic teller machines in India".

"One piece of malware, dubbed ATMDtrack by researchers with the Moscow-based security firm, has been targeting Indian ATMs since last summer. It allows its operators to read and store data associated with cards that are inserted into infected ATMs. As researchers with the Moscow-based security firm investigated further, they found that the ATM malware was part of a larger remote-access trojan that carries out traditional espionage activities. Dubbed "Dtrack", it was used as recently as this month to target financial institutions and research centers."

Congress leader Shashi Tharoor tweeted: "With NPCIL confirming the cyber attack on Kudankulam, the National Cyber Security Coordinator (NCSC) and NSA must address public concerns about this dangerous intrusion."

He said that at the Combined Commanders Conference in 2014, @PMOIndia called for the creation of a Digital Armed Force. "Five years later, there is no sign of it. Is this yet another jumla? On national security, can we afford hollow promises?"

He said the "National Critical Information Infrastructure Protection Centre is under the 'administrative control' of the NTRO. Under this government, why has India's premier technical intelligence agency not been offered the resources to fight back against such attacks?"

"The North Korea-based Lazarus Group has been purportedly linked to the cyber attack. Do such mercenary groups act alone, or are they hired by bigger and more powerful states, to target India's strategic installations?" he asked.

RECENT STORIES

'Iconic Jodi!' Netizens Can't Stop Reacting As PM Modi Thanks Italian PM Meloni For G7 Summit...

'Iconic Jodi!' Netizens Can't Stop Reacting As PM Modi Thanks Italian PM Meloni For G7 Summit...

Bulldozer Welcome For UP CM Yogi Adityanath In Chhattisgarh's Bilaspur; Video Goes Viral

Bulldozer Welcome For UP CM Yogi Adityanath In Chhattisgarh's Bilaspur; Video Goes Viral

Madhya Pradesh Lok Sabha Election 2024 Phase 2 Live: Newlyweds Cast Their Vote Soon After Wedding In...

Madhya Pradesh Lok Sabha Election 2024 Phase 2 Live: Newlyweds Cast Their Vote Soon After Wedding In...

Live Breaking News Updates: Tripura Records Highest Voter Turnout Till 11 AM; Chhattisgarh Follows

Live Breaking News Updates: Tripura Records Highest Voter Turnout Till 11 AM; Chhattisgarh Follows

'TMC, Congress Got Defeat In 1st Phase, Will Get Destroyed In 2nd Phase': Thunders PM Modi At WB...

'TMC, Congress Got Defeat In 1st Phase, Will Get Destroyed In 2nd Phase': Thunders PM Modi At WB...