Malware in computer at Kudankulam plant, admits Nuclear Power Corporation of India.
CERT-In, which is Indias National Computer Emergency Response Team noticed the malware on September 4, 2019.
The matter was then immediately investigated by Indias Department of Atomic Energy (DAE).
Identification of malware in the NPCIL system is correct.
The matter was immediately investigated by DAE specialists.
The investigation revealed that the infected PC belonged to a user who was connected to the Internet-connected data pipe.
This is isolated from the critical internal internet.
The networks are being continuously monitored.
The investigation also confirms that the plant systems are not affected.
According to Singh, the attack was not a trivial matter and he did not want to create panic.
The Operational Technology online grid is generally air-gapped, as its most critical.
I was merely pointing out that the administrative IT web link seems to be compromised.
It doesnt necessarily imply the reactors control systems were impacted.
The cyberattack on NPCIL facilities is shocking and reveals the lack of adequate safety measures.
The Union Government must conduct a thorough enquiry into the lapses.
The National Cyber Security Coordinator owes an explanation on the preparedness of such facilities, he tweeted.
The callous manner in which NPCIL dealt with this issue even furthers the fears.
We want the state and central government to investigate this cyber attack and bring the culprits to task.
source: www.techworm.net