German Nuclear Plant Is ‘Riddled’ With Malware

A German nuclear power plant in Bavaria has admitted that its systems are riddled with malware, and has been shut down as a precaution – a day after the 30th anniversary of the Chernobyl nuclear disaster on Tuesday.

It was reported that the Gundremmingen nuclear power plant is located (75 miles) northwest of Munich, is run by the German utility RWE.

The company admitted that malware had infected a number of its systems. It said it had immediately informed Germany’s Federal Office for Information Security (BSI).

Malware Infection

Reuters reports “W32.Ramnit” and “Conficker” viruses were discovered at Gundremmingen’s B unit in a computer system retrofitted in 2008 with data visualisation software associated with equipment for moving nuclear fuel rods.

Malware was also reportedly found on 18 removable data drives, mainly USB sticks, in office computers maintained separately from the plant’s operating systems.

The operator said that it has boosted its cyber-security measures, but insisted the malware was not a threat to the facility’s operations because it is “isolated from the Internet.”

Nuclear Security

This is not the first time that a nuclear power plant has had a security scare. Indeed, the potential risk to systems controlling critical infrastructure and industrial systems remains a worry for many governments and authorities around the world.

In 2015 a hacker managed to hack into the systems of a nuclear power plant in South Korea. A computer worm was later discovered in a device connected to the control system, but the plant operator insisted that the breach had not reached the reactor controls itself.

The hacker later posted files from the hack online, and included a demand for money.

The Stuxnet virus reportedly caused damage to nearly 3,000 centrifuges in the Natanz facility in Iran.

A German steelworks also suffered “massive damage” after a cyber attack on its computer network in late 2014.

Researchers have previously warned that security weaknesses in industrial control systems could allow hackers to create cataclysmic failures in infrastructure.

Are you a security pro? Try our quiz!

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Meta Declines On Heavy AI Spending Plans, Despite Strong Q1

Share price hit after Meta admits heavy AI spending plans, after posting strong first quarter…

12 hours ago

Google Delays Removal Of Third-Party Cookies, Again

For third time Google delays phase-out of third-party Chrome cookies after pushback from industry and…

14 hours ago

Tesla Posts Biggest Revenue Drop Since 2012

Elon Musk firm touts cheaper EV models, as profits slump over 50 percent in the…

15 hours ago

Apple iPhone Q1 Sales In China Fall 19 Percent, Says Counterpoint

Bad news for Tim Cook, as Counterpoint records 19 percent fall in iPhone sales in…

18 hours ago

President Biden Signs TikTok Ban Or Divest Bill Into Law

TikTok pledges to challenge 'unconstitutional' US ban in the courts, after President Joe Biden signs…

20 hours ago