After first denying any malware attack, the Nuclear Power Corporation of India (NPCIL) has confirmed the presence of malware in its system at the Kudankulam nuclear plant, which has been traced to North Korea’s Dtrack. In a press statement, the NPCIL said, “Identification of malware in NPCIL system was correct,” but added that the “infected PC” belonged to a user “who was connected in the internet connected network used for administrative purposes.”
It said the infected PC “has been isolated from the critical internal network” and that the “networks are being continuously monitored”. It added, “Investigation also confirms that the plant systems are not affected.”
Earlier, in the statement, it said that the matter was conveyed by CERT-in (Indian Computer Emergency Response Team, an office within the Ministry of Electronics and Information Technology) when they noticed it on September 4.
“The matter was immediately investigated by DAE (Department of Atomic Energy) specialists,” the statement said.
The NPCIL is a body under the DAE, which in turn comes under the purview of the prime minister’s office. According to Zednet, Pukhraj Singh, a former security analyst for India’s National Technical Research Organization (NTRO), pointed out that a recent VirusTotal upload was actually linked to a malware infection at the Kudankulam Nuclear Power Plant.
The particular malware sample included hardcoded credentials for KNPP’s internal network, suggesting the malware was specifically compiled to spread and operate inside the power plant’s IT network.
Several security researchers identified the malware as a version of Dtrack, a backdoor trojan developed by the Lazarus Group, North Korea’s elite hacking unit.
Singh’s tweet and revelation immediately went viral because just days before, the same power plant had an unexpected shutdown of one of its reactors — with many users conflating the two unrelated incidents as one.
In a press statement on Tuesday, the NPCIL had denied any malware attack. It said that “false information was being circulated” on the social media platform, electronic and print media on a malware attack on the Kudankulam plant. It said that KNPP and other Indian Nuclear Power Plants Control Systems are “stand alone and not connected to outside cyber network and internet”.
“Any cyber attack on the Nuclear Power Plant Control System is not possible”, it said, and added that Kudanklam Unit 1 and 2 “are operating without any operational or safety concerns”.
Arstechnica.com, quoting Kaspersky Lab said, said in a recent article on Dtrack, “North Korea’s hermit government has developed a new strain of malware that steals data used at automatic teller machines in India”.
“One piece of malware, dubbed ATMDtrack by researchers with the Moscow-based security firm, has been targeting Indian ATMs since last summer. It allows its operators to read and store data associated with cards that are inserted into infected ATMs. As researchers with the Moscow-based security firm investigated further, they found that the ATM malware was part of a larger remote-access trojan that carries out traditional espionage activities. Dubbed “Dtrack”, it was used as recently as this month to target financial institutions and research centers.”
Congress leader Shashi Tharoor tweeted: “With NPCIL confirming the cyber attack on Kudankulam, the National Cyber Security Coordinator (NCSC) and NSA must address public concerns about this dangerous intrusion.”
He said that at the Combined Commanders Conference in 2014, @PMOIndia called for the creation of a Digital Armed Force. “Five years later, there is no sign of it. Is this yet another jumla? On national security, can we afford hollow promises?”
He said the “National Critical Information Infrastructure Protection Centre is under the ‘administrative control’ of the NTRO. Under this government, why has India’s premier technical intelligence agency not been offered the resources to fight back against such attacks?”
“The North Korea-based Lazarus Group has been purportedly linked to the cyber attack. Do such mercenary groups act alone, or are they hired by bigger and more powerful states, to target India’s strategic installations?” he asked.
If you have an interesting article / experience / case study to share, please get in touch with us at [email protected]