German Nuclear Plant Is ‘Riddled’ With Malware

A German nuclear power plant in Bavaria has admitted that its systems are riddled with malware, and has been shut down as a precaution – a day after the 30th anniversary of the Chernobyl nuclear disaster on Tuesday.

It was reported that the Gundremmingen nuclear power plant is located (75 miles) northwest of Munich, is run by the German utility RWE.

The company admitted that malware had infected a number of its systems. It said it had immediately informed Germany’s Federal Office for Information Security (BSI).

Malware Infection

Reuters reports “W32.Ramnit” and “Conficker” viruses were discovered at Gundremmingen’s B unit in a computer system retrofitted in 2008 with data visualisation software associated with equipment for moving nuclear fuel rods.

Malware was also reportedly found on 18 removable data drives, mainly USB sticks, in office computers maintained separately from the plant’s operating systems.

The operator said that it has boosted its cyber-security measures, but insisted the malware was not a threat to the facility’s operations because it is “isolated from the Internet.”

Nuclear Security

This is not the first time that a nuclear power plant has had a security scare. Indeed, the potential risk to systems controlling critical infrastructure and industrial systems remains a worry for many governments and authorities around the world.

In 2015 a hacker managed to hack into the systems of a nuclear power plant in South Korea. A computer worm was later discovered in a device connected to the control system, but the plant operator insisted that the breach had not reached the reactor controls itself.

The hacker later posted files from the hack online, and included a demand for money.

The Stuxnet virus reportedly caused damage to nearly 3,000 centrifuges in the Natanz facility in Iran.

A German steelworks also suffered “massive damage” after a cyber attack on its computer network in late 2014.

Researchers have previously warned that security weaknesses in industrial control systems could allow hackers to create cataclysmic failures in infrastructure.

Are you a security pro? Try our quiz!

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Apple Orders Staff Back To Office, Three Days A Week

Memo from Tim Cook tells Apple staff in the Bay area, that from next month,…

21 mins ago

Silicon UK In Focus Podcast: Configuring Security

Do businesses need a radical change in how they approach access security? Does a shift…

1 hour ago

New US Export Controls Target China Semiconductor Firms

US introduces export controls on design software and substrate materials to block Chinese companies from…

1 day ago

US Judge Approves Apple Settlement In Retail Class Action Lawsuit

US federal judge approves settlement offered by Apple in nearly decade-old case over compensation for…

1 day ago

Ola Plans Premium Electric Car For Indian Market

SoftBank-backed ride-hailing firm Ola Electric announces range of electric cars starting in 2024 following success…

1 day ago

Faraday Future Raises Fresh Backing For Electric SUV Debut

Electric car start-up Faraday Future looks to raise up to $600m in new funds as…

1 day ago