Nuclear Regulator Hacked 3 Times In 3 Years 66
mdsolar (1045926) writes with this disconcerting story from CNet about security breaches at the U.S. Nuclear Regulatory Commission, revealed in a new report to have been compromised three times in the last three years: The body that governs America's nuclear power providers said in an internal investigation that two of the hacks are suspected to have come from unnamed foreign countries, the news site Nextgov reported based on a Freedom of Information Act request. The source of the third hack could not be identified because the logs of the incident had been destroyed, the report said. Hackers, often sponsored by foreign governments, have targeted the US more frequently in recent years. A report (PDF) on attacks against government computers noted that there was a 35 percent increase between 2010 and 2013.
Intruders used common hacking techniques to get at the NRC's computers. One attack linked to a foreign country or individual involved phishing emails that coerced NRC employees into submitting their login credentials. The second one linked to a foreign government or individual used spearphishing, or emails targeted at specific NRC employees, to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive. The third attack involved breaking into the personal account of a NRC employee. After sending a malicious PDF attachment to 16 other NRC employees, one person was infected with malware.
Intruders used common hacking techniques to get at the NRC's computers. One attack linked to a foreign country or individual involved phishing emails that coerced NRC employees into submitting their login credentials. The second one linked to a foreign government or individual used spearphishing, or emails targeted at specific NRC employees, to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive. The third attack involved breaking into the personal account of a NRC employee. After sending a malicious PDF attachment to 16 other NRC employees, one person was infected with malware.
Some details (Score:4, Informative)
I thought I'd provide some anecdotal evidence for the sake of argument. I've worked at 3 major telephone companies/ISPs over the years and have been involved in installing phone and data lines at multiple power companies across the country including 1 reactor. In every case the power company had a standing police that basically boiled down to "No data enters the facility" It used to be a rule that "no copper entered the facility" but that changed with the advent of fiberoptics. I don't know if this is a law, or just a common security practice, but in the dozens of facilities I've worked with they were all air-gaped. Again, this is anecdotal, I don't know if this is done everywhere, but I certainly found it reassuring when I saw it.
On the other hand, I did work with a local municipality once that opened and closed the local damn with a single copper pair running between the control house and the damn. When the damn overflowed and flooded that copper pair rendering it inoperable, they were furious with us because we wouldn't "fix it" I had to explain to a local community leader that our field techs are not trained to use scubba gear and had we known the safety of the entire community was riding on a single $12/month copper pair we'd have likely suggested an alternative solution.