German Nuclear Plant Is ‘Riddled’ With Malware

A German nuclear power plant in Bavaria has admitted that its systems are riddled with malware, and has been shut down as a precaution – a day after the 30th anniversary of the Chernobyl nuclear disaster on Tuesday.

It was reported that the Gundremmingen nuclear power plant is located (75 miles) northwest of Munich, is run by the German utility RWE.

The company admitted that malware had infected a number of its systems. It said it had immediately informed Germany’s Federal Office for Information Security (BSI).

Malware Infection

Reuters reports “W32.Ramnit” and “Conficker” viruses were discovered at Gundremmingen’s B unit in a computer system retrofitted in 2008 with data visualisation software associated with equipment for moving nuclear fuel rods.

Malware was also reportedly found on 18 removable data drives, mainly USB sticks, in office computers maintained separately from the plant’s operating systems.

The operator said that it has boosted its cyber-security measures, but insisted the malware was not a threat to the facility’s operations because it is “isolated from the Internet.”

Nuclear Security

This is not the first time that a nuclear power plant has had a security scare. Indeed, the potential risk to systems controlling critical infrastructure and industrial systems remains a worry for many governments and authorities around the world.

In 2015 a hacker managed to hack into the systems of a nuclear power plant in South Korea. A computer worm was later discovered in a device connected to the control system, but the plant operator insisted that the breach had not reached the reactor controls itself.

The hacker later posted files from the hack online, and included a demand for money.

The Stuxnet virus reportedly caused damage to nearly 3,000 centrifuges in the Natanz facility in Iran.

A German steelworks also suffered “massive damage” after a cyber attack on its computer network in late 2014.

Researchers have previously warned that security weaknesses in industrial control systems could allow hackers to create cataclysmic failures in infrastructure.

Are you a security pro? Try our quiz!

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

6 hours ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

7 hours ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

11 hours ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

1 day ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

1 day ago