Hackers target U.S. nuclear facilities

MindWars

Diamond Member
Oct 14, 2016
42,227
10,772
2,040
Hackers target U.S. nuclear facilities

Former CIA Officer Mike Baker on reports hackers are targeting nuclear power plants in the U.S. and the Trump administration's efforts to clamp down on leaks.

Hackers are reportedly targeting the computer networks of companies that operate nuclear power stations and energy facilities.
-------------------------------------------------------------------------

Oh the bs of blame . " State Sponsored" isn't that special. They'll just make it sound as if it's just so unhackable until they tell you it's been hacked which occurs when they can't keep a lid on it . lol
 
Hackers target U.S. nuclear facilities

Former CIA Officer Mike Baker on reports hackers are targeting nuclear power plants in the U.S. and the Trump administration's efforts to clamp down on leaks.

Hackers are reportedly targeting the computer networks of companies that operate nuclear power stations and energy facilities.
-------------------------------------------------------------------------

Oh the bs of blame . " State Sponsored" isn't that special. They'll just make it sound as if it's just so unhackable until they tell you it's been hacked which occurs when they can't keep a lid on it . lol

Nuclear sites are to be Isolated networks. No outside connections.. So hacking of these sites cant happen unless there are inside participants.. Even power control systems for other generating stations are isolated having dedicated fiber optics for communications.

There would have to be major breaches in DOE protocol for this to happen.
 
The Israelis were able to hack Iranian nuclear facilities by embedding Stuxnet viruses onto porn. The operators at those sites viewed the porn on their work computers and the virus spread even to the industrial machinery code. They were able to destroy 1,000 uranium processing centrifuges by over spinning them via controls from the virus.
 
The Israelis were able to hack Iranian nuclear facilities by embedding Stuxnet viruses onto porn. The operators at those sites viewed the porn on their work computers and the virus spread even to the industrial machinery code. They were able to destroy 1,000 uranium processing centrifuges by over spinning them via controls from the virus.
Would explain DOE rules..
 
Would explain DOE rules..

Pretty sure these guys have some fairly strict rules about porn on work computers ...
Iran-Mullahs-Rule.jpg


Still didn't stop them.
 
Believe it or not most nuclear stations are still stuck in the 60 and 70s in technology. Their license to operate spells out their systems and that isn't easy to change. So Nuclear companies spend a lot of time getting obsolete equipment.

Although the power plant computers are isolated it would be a major PITA if the local LAN was hacked.

Now fossil plants who have upgraded could be at more of a risk for hacking, that I am not sure of.
 
Believe it or not most nuclear stations are still stuck in the 60 and 70s in technology. Their license to operate spells out their systems and that isn't easy to change. So Nuclear companies spend a lot of time getting obsolete equipment.

Although the power plant computers are isolated it would be a major PITA if the local LAN was hacked.

Now fossil plants who have upgraded could be at more of a risk for hacking, that I am not sure of.

Worlds WORST porn ...

preview.png
 
Hackers tryin' to trigger nuclear meltdown...
eek.gif

Hackers breached a dozen US nuclear plants, reports say
Fri, 07 Jul 2017 - Operating firms were targeted by malicious code hidden in fake job applications, US media report.
Hackers breached at least a dozen US power plants in attacks in May and June, US media report, citing intelligence officials. The targets included the Wolf Creek nuclear facility in Kansas, according to several reports. An urgent Department of Homeland Security (DHS) report indicated a foreign power, possibly Russia, was responsible, the New York Times said. The DHS document carried the second-highest threat rating, the Times said. Wolf Creek Nuclear Operating Corp declined to say if the plant was hacked but said there had been "no operational impact" at the plant. "The reason that is true is because the operational computer systems are completely separate from the corporate network," spokeswoman Jenny Hageman told Reuters.

_96850653_mediaitem96850652.jpg

The Wolf Creek plant in Kansas was reportedly among those attacked​

In a joint statement with the FBI, a spokesman for the Department of Homeland Security said there was "no indication of a threat to public safety". The hackers appeared to be attempting to map out computer networks for future attacks, according to the DHS report seen by the Times. They sent highly targeted emails to senior engineers at operating firms behind the nuclear plants, mimicking job applications but laced with malicious code, the newspaper said. Officials told the Times that the techniques resembles those used by Russian specialists linked to previous attacks on energy facilities.

US investigators accused Russia-based hackers of being behind a 2015 attack that caused blackouts across Ukraine. Hacking is a tool increasingly deployed by nation states to infiltrate foreign industrial networks. The US and Israel reportedly used the now-infamous Stuxnet worm in an attempt to damage an Iranian nuclear facility. The worm attacked the facility's nuclear centrifuges by overriding the system and instructing them to spin much faster than intended, reportedly causing severe physical damage.

Hackers breached a dozen US nuclear plants, reports say - BBC News

See also:

Could new data laws end up bankrupting your company?
Thu, 06 Jul 2017 - The EU General Data Protection Regulations (GDPR) start next year, but many firms are ill prepared.
The European Union's General Data Protection Regulation (GDPR) comes into force in May 2018, radically changing the way organisations have to look after our personal data. Failure to comply could lead to huge fines, yet many businesses are far from ready. Here's why you should care.

_96831481_gettyimages-511585616.jpg

Many companies are in full "panic" mode, says KPMG's Mark Thompson​

What is GDPR exactly?

A new EU regulation governing how organisations should handle and protect our personal data. Many of the stipulations are already covered by the UK's Data Protection Act; but simply put, organisations need to keep records of all personal data, be able to prove that consent was given, show where the data's going, what it's being used for, and how it's being protected. Accountability is the new watchword. If personal data gets stolen after a cyber-attack, companies have to report the breach within 72 hours of realising it. And the definition of personal data has been extended to include extra categories such as your computer's IP address or your genetic make-up - anything that could be used to identify you.

Why should businesses care?

Non-compliance with the GDPR could lead to huge fines of 20 million euros or 4% of global turnover, whichever is the greater. For a company like tech giant Apple, that could amount to billions of dollars. Consult Hyperion, an electronic financial transactions specialist, forecasts that European financial institutions could face fines totalling 4.7bn euros (£4.1bn; $5.3bn) in the first three years following the GDPR coming into force. Anthony Lee, a partner in law firm DMH Stallard, says: "Talk Talk [a UK telecoms company] was fined £400,000 for failing to prevent the 2015 customer data breach, but under the new regime fines could be many multiples of this."

_96831477_gettyimages-480981612.jpg

Is this your firm's attitude to GDPR?​

However, a spokesperson for the UK's Information Commissioner's Office (ICO) - the body responsible for enforcing GDPR in the UK - says: "The new law equals bigger fines for getting it wrong but it's important to recognise the business benefits of getting data protection right. "There is a real opportunity for organisations to present themselves on the basis of how they respect the privacy of individuals - and gain a competitive edge. "But if your organisation can't demonstrate that good data protection is a cornerstone of your business policy and practices when the new law comes in next year, you're leaving your organisation open to enforcement action that can damage both public reputation and bank balance."

Why should consumers care?
 

Forum List

Back
Top