British Nuclear Power Facility Attacked

Britain’s oldest and most vulnerable nuclear power plant, Sellafield, might have been hacked into by cyber groups closely linked to Russia and/ or China it has been claimed by The Guardian newspaper. 

The newspaper claims the plant has come under cyber attack by groups closely linked to the two nations,  although the plant itseld says it is not aware that it has been hacked. 

Sellafield (pictured) is located on the coast in Cumbria, is a former power station that now processes nuclear waste from across Britain. The site has the largest store of plutonium on the planet and is a repository for nuclear waste from weapons programmes and decades of nuclear power generation. 

Sellafield's managemnet are said to be unaware when the site was first hacked, but came across sleeper malware, which can be used to spy or attack systems, as far back as 2015. It is not clear if this malware is still present in computer systems, with its existence allegedly covered up by senior staff.

In 2018 a nuclear power sation in Germany was found to have been infected with computer viruses. Built more than 70 years ago the Sellafield site is no longer used for power generation and has been used to make plutonium for nuclear weapons and has also taken in radioactive waste from other countries for reprocessing.

The Guardian's investigation suggests the Sellafirld management do not know exactly when the IT systems were first compromised. But sources said breaches were first detected in 2015, when experts realised sleeper malware, software that can  be used to spy or attack systems, had been embedded in the plant’s computer networks. It is not known if the malicious software has been removed, raising concerns about the leakage of sensitive and important information.

In response to the newspaper report,the UK government has said there is no records or evidence to suggest that networks at the Sellafield nuclear site were the victim of a successful cyber attack by state actors.

Espionage by Russia and China are among the biggest threats to the UK, according to government security officials and the most recent National Risk Register, an official document that outlines the key hazards the UK could face, includes a cyber-attack on civil nuclear infrastructure.

Guardian:    SellafiledLtd     Gov.UK:     Gov.UK:     Energy Live:    Reuters:     GBNews:    ITV:     Mail

Images: @SellafiedUK & moneycortex

You Might Also Read: 

Indian Energy Company Hit By Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible



 

« Cyber Criminals Go Phishing
Global Guidelines For Artificial Intelligence Agreed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

CyberSec Vietnam

CyberSec Vietnam

The CyberSec Vietnam Conference on 13 June 2024 in Ho Chi Minh City focuses on the critical pursuit of building trust in digital networks and fortifying Vietnam's cybersecurity ecosystem.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.