{"id":46473,"date":"2014-08-25T12:00:24","date_gmt":"2014-08-25T11:00:24","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=46473"},"modified":"2015-05-05T21:30:41","modified_gmt":"2015-05-05T20:30:41","slug":"hackers-successfully-crack-us-nuclear-facilities-for-the-first-time-twice","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/08\/hackers-successfully-crack-us-nuclear-facilities-for-the-first-time-twice\/","title":{"rendered":"Hackers Successfully Crack US Nuclear Facilities for the First Time&#8230; Twice"},"content":{"rendered":"<p><em>19 Aug 2014 &#8211; The United States has admitted that hackers attacking its nuclear power plants have already succeeded. Twice.<\/em><\/p>\n<p>An <a target=\"_blank\" href=\"http:\/\/www.nextgov.com\/cybersecurity\/2014\/08\/exclusive-nuke-regulator-hacked-suspected-foreign-powers\/91643\/\" >investigation by the Nuclear Regulatory Commission<\/a>, which oversees the US nuclear power grid, uncovered two incidents in which hackers were able to access its internal documents.<\/p>\n<p>The NRC is tasked with managing information about nuclear reactors, including those which handle weapons-grade material.<\/p>\n<p>One of the hacking incidents, <a target=\"_blank\" href=\"http:\/\/www.nextgov.com\/cybersecurity\/2014\/08\/exclusive-nuke-regulator-hacked-suspected-foreign-powers\/91643\/\" >as reported by NextGov,<\/a> involved emails sent to 215 NRC employees designed to steal their login details.<\/p>\n<p>Around 12 employees ended up falling for it, according to the report, entering their username and password into a Google spreadsheet. The IG Cyber Crime Unit then tracked that spreadsheet to a user &#8220;in a foreign country&#8221; &#8211; though it is not clear who was behind the simple attack.<\/p>\n<p>Another attempt saw hackers embed a URL in an email which linked to a &#8220;a cloud-based Microsoft Skydrive storage site&#8221;, which itself hosted various malware designed to compromise computers. Further attacks involved breaking into the personal email account of an NRC employee and sending a virus-laden PDF file to other staff members.<\/p>\n<p>Commission spokesman David McIntyre said that the NRC &#8220;detects and thwarts&#8221; the majority of these attempts, but admitted two had succeeded. It&#8217;s not known for sure what information if any was taken.<\/p>\n<p>&#8220;The few attempts documented in the OIG cyber crimes unit report as gaining some access to NRC networks were detected and appropriate measures were taken,&#8221; he said.<\/p>\n<p>Experts <a target=\"_blank\" href=\"http:\/\/www.nextgov.com\/cybersecurity\/2014\/08\/exclusive-nuke-regulator-hacked-suspected-foreign-powers\/91643\/\" >speaking to NextGov<\/a> said that a foreign government was likely responsible.<\/p>\n<p><em>&#8220;Clearly, the spearphishing is a technique that we&#8217;ve seen the Chinese and the Russians use before,&#8221; said Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, to the website.<\/em><\/p>\n<p><em>&#8220;Using the general logic, a nation state is going to be more interested in the NRC than you would imagine common criminals would be.&#8221;<\/em><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.huffingtonpost.co.uk\/2014\/08\/19\/hackers-nuclear-plants_n_5690547.html\" >Go to Original \u2013 huffingtonpost.co.uk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>19 Aug 2014 &#8211; The United States has admitted that hackers attacking its nuclear power plants have already succeeded. Twice.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[65],"tags":[],"class_list":["post-46473","post","type-post","status-publish","format-standard","hentry","category-anglo-america"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/46473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=46473"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/46473\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=46473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=46473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=46473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}