New Delhi, Oct 31 : The Nuclear Power Corporation of India (NPCIL) on Wednesday admitted of a malware attack at the Kudankulam nuclear plant, which has been traced to North Korea’s Dtrack.
The particular malware sample included hardcoded credentials for KNPP’s internal network, suggesting the malware was specifically compiled to spread and operate inside the power plant’s IT network.
Several security researchers identified the malware as a version of Dtrack, a backdoor trojan developed by the Lazarus Group, North Korea’s elite hacking unit.
In a press statement, the NPCIL said “identification of malware in NPCIL system was correct” but added that the “infected PC” belonged to a user “who was connected in the internet connected network used for administrative purposes”.
It said the infected PC “has been isolated from the critical internal network” and that the “networks are being continuously monitored”.
It added: “Investigation also confirms that the plant systems are not affected”.
The Malware attack was noticed on September 4 but, in the statement, it said that the matter was conveyed by CERT-in (Indian Computer Emergency Response Team, an office within the Ministry of Electronics and Information Technology).
“The matter was immediately investigated by DAE (Department of Atomic Energy) specialists,” the statement said.
The NPCIL is a body under the DAE, which in turn comes under the purview of the prime minister’s office.
According to Zednet, Pukhraj Singh, a former security analyst for India’s National Technical Research Organization (NTRO), pointed out that a recent VirusTotal upload was actually linked to a malware infection at the Kudankulam Nuclear Power Plant.
Singh’s tweet and revelation immediately went viral because just days before, the same power plant had an unexpected shutdown of one of its reactors — with many users conflating the two unrelated incidents as one.
In a press statement on Tuesday, the NPCIL had denied any malware attack.
It said that “false information was being circulated” on the social media platform, electronic and print media on a malware attack on the Kudankulam plant.
It said that KNPP and other Indian Nuclear Power Plants Control Systems are “stand alone and not connected to outside cyber network and internet”.
“Any cyber attack on the Nuclear Power Plant Control System is not possible”, it said, and added that Kudanklam Unit 1 and 2 “are operating without any operational or safety concerns”.
Arstechnica.com, quoting Kaspersky Lab said, said in a recent article on Dtrack: “North Korea’s hermit government has developed a new strain of malware that steals data used at automatic teller machines in India”.
“One piece of malware, dubbed ATMDtrack by researchers with the Moscow-based security firm, has been targeting Indian ATMs since last summer. It allows its operators to read and store data associated with cards that are inserted into infected ATMs. As researchers with the Moscow-based security firm investigated further, they found that the ATM malware was part of a larger remote-access trojan that carries out traditional espionage activities.
“DTrack, flagged by cyber-security firm Kaspersky, is used by hackers to attack financial and research centres in India. It’s earlier version ATMDtrack was designed to hack ATMs in India. “The malware was designed to be planted on the victim’s ATMs, where it could read and store the data of cards that were inserted into the machines,” a post by Kaspersky said in September.
Lazarus is an arm of the North Korean regime. Lazarus first landed on the radar of many security researchers following the infamous Sony Pictures hack in late 2014. Once considered a ragtag ensemble of hackers, the group has risen to prominence over the years with a series of lucrative hacks involving the SWIFT payment network used by banks.
After the due investigations, the cyber experts have tied the 2013 cyberattack in South Korea and WannaCry ransom worm attacks in 2017 to Lazarus Group.
Congress leader Shashi Tharoor tweeted: “With NPCIL confirming the cyber attack on Kudankulam, the National Cyber Security Coordinator (NCSC) and NSA must address public concerns about this dangerous intrusion.”
He said that at the Combined Commanders Conference in 2014, @PMOIndia called for the creation of a Digital Armed Force. “Five years later, there is no sign of it. Is this yet another jumla? On national security, can we afford hollow promises?”
He said the “National Critical Information Infrastructure Protection Centre is under the ‘administrative control’ of the NTRO. Under this government, why has India’s premier technical intelligence agency not been offered the resources to fight back against such attacks?”
“The North Korea-based Lazarus Group has been purportedly linked to the cyber attack. Do such mercenary groups act alone, or are they hired by bigger and more powerful states, to target India’s strategic installations?” he asked.