Malware Steals Data from Japanese Nuke

Friday, January 10, 2014 @ 03:01 PM gHale

A piece of malware was on a computer in the reactor control room at the Monju nuclear power plant in Japan. The malware, discovered Jan. 2, stole private information from the infected machine, officials said.

The Monju fast-breeder reactor is not operational. It only operated for a few months after it launched in April 1994. There were some attempts to restart it, but in May last year, the country’s Nuclear Regulation Authority officially decided to prohibit its restart.

RELATED STORIES
Security Woes at PA Nuke
Malware Infects Atomic Agency
Cyber Threat: Managed Services
NIST Cybersecurity Framework: What it Means

The infection appears that one of the facility’s employees wanted to update a video playback program, Japan Today reported.

Since workers use the computer to file paperwork, there may not be much damage this piece of malware could have caused. Having said that, the attackers controlling the malware could have stolen sensitive documents, including emails, training records and employee data sheets.

Over 42,000 documents were on the device.

As far as the malware goes, it apparently communicated with a server in South Korea. The infected device ended up accessed more than 30 times during a five-day period after the worker performed the video software update.



Leave a Reply

You must be logged in to post a comment.