Filename | Rogue software update cause Malware attack on Japanese Nuclear Power Plant |
Permission | rw-r--r-- |
Author | Unknown |
Date and Time | 1/10/2014 |
Label | Cyber News |
Action |
Ethical Hacking Institute in Pune
./Arizona Team
The most critical and worst target of a State-sponsored cyber-attacks could be Hospitals, Dams, Dykes and Nuclear power stations and this may cause military conflicts between countries.
According to Japan Today, The Monju nuclear power plant in Tsuruga, Japan was accidentally targeted by a malware on 2nd January, when a worker updated the system to the latest version of the video playback program.
Monju Nuclear Plant is a sodium-cooled fast reactor, was launched in April 1994. It has been not operational for most of the past 20 years, after an accident in which a sodium leak caused a major fire.
Employees over there now only file company paperwork, and so the malware could have stolen only some sensitive documents, emails, training records and employee data sheets. The Malware command-and-control server suspected to be from South Korea.
The malware itself is not much sophisticated like Stuxnet or Duqu, but updating the unmanaged software update and patch management system can seriously lead to critical cyber attack, even not being connected to the internet does not prevent you from being infected.
One of the best examples of flawed policies is Stuxnet, one of the most infamous pieces of malware ever created to destroy Iranian Nuclear plants and infected the systems through a USB stick only.
Also in November, The Kaspersky revealed that Russian astronauts carried a removable device into space which infected systems on the space station.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune
./Arizona Team
The most critical and worst target of a State-sponsored cyber-attacks could be Hospitals, Dams, Dykes and Nuclear power stations and this may cause military conflicts between countries.
According to Japan Today, The Monju nuclear power plant in Tsuruga, Japan was accidentally targeted by a malware on 2nd January, when a worker updated the system to the latest version of the video playback program.
Monju Nuclear Plant is a sodium-cooled fast reactor, was launched in April 1994. It has been not operational for most of the past 20 years, after an accident in which a sodium leak caused a major fire.
Employees over there now only file company paperwork, and so the malware could have stolen only some sensitive documents, emails, training records and employee data sheets. The Malware command-and-control server suspected to be from South Korea.
The malware itself is not much sophisticated like Stuxnet or Duqu, but updating the unmanaged software update and patch management system can seriously lead to critical cyber attack, even not being connected to the internet does not prevent you from being infected.
One of the best examples of flawed policies is Stuxnet, one of the most infamous pieces of malware ever created to destroy Iranian Nuclear plants and infected the systems through a USB stick only.
Also in November, The Kaspersky revealed that Russian astronauts carried a removable device into space which infected systems on the space station.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune