A dangerous nuclear facility in the UK has been allegedly attacked by actors of cyber threats associated with Russia and China. As MentorThe IT system agreement on the cellfield nuclear waste and decomination site may return in 2015, alleging that senior employees of covering the breech. Sleeper malware – which literates into an infected system to steal data or launch attacks – is believed to have been embedded in Sailfield’s computer network.
Sources claim that it is likely that foreign hackers have access the highest areas of confidential materials on the site, while the limits of the risks running for any data loss or system are unknown at the time of writing. MentorThe revelations are part of a one -year long investigation by a newspaper in cyber hacking, radioactive contamination and toxic workplace culture in Sailfield.
Salefield denies successful cyber attack claims
In a statement published on the UK Government website, Sailfield denied claims that its network is “no record or evidence” to tell that it has been successfully attacked in a manner described on its network. . The statement said, “Our monitoring systems are strong and we have a high level of confidence that there is no such malware on our system.”
It was well confirmed to the newspaper before publication, as well as refuting with several other impurities in their reporting, it said. “We have asked Mentor To provide evidence related to this alleged attack so that we can investigate. They have failed to provide it. ,
The statement continued, taking cyber security with all systems and servers is taken very seriously with all systems and servers, with several layers. “Important networks that enable us to operate safely are isolated from our normal IT network, meaning that the attack on our IT system will not enter them.”
Cyber attacks by nation states and hecticists and cyber espionage global citizens are a significant threat to nuclear infrastructure. Last month, one of the Data Breach, part of the US Department of Energy and one of the country’s leading advanced nuclear power test laboratories highlighted the sensitive information of the employees. A hecticist group claimed responsibility for the incident on social media after claiming to have “hundreds of thousands of” data points from INL. This includes alleged date of birth, email address, phone number, social security numbers, physical addresses and employment information.
Reported Breach represents one related to cyber security surveillance
The revelations of Sellafield, if true, belongs to a cyber security inspection made in an extended period, which was commented by Cyber Security Indeller Fergle Leones at Safety Firm Centreptal. “It is worrying how this negligence did not pay any attention and was reduced by regulators. This situation underlines the challenging task of protecting any high value facility under continuous siege by the attackers globally. ,
To address these dangers, these attackers require a deep dive to recognize and understand – where they are born and who they are, Leon added. “It is important to note that in more than 95 percent of cyber attacks globally, some forms of danger information were present, if effectively leveraged, may reduce the destructive effects of the attack.” He said traditional cyber security rescues are failing on many fronts, as it is evident in ransomware attacks and bouncing data violations, indicating the need for the need for the industry-wide revaluation of our existing defensive strategies.
Internationally famous computer safety experts, Professor Alan WoodwardOn X (East Twitter) said: “If someone really broke the Sailfield Network, I hope they expect goodness that they are not really stupid. We all will regret it. ,