Nuclear Regulator Hacked 3 Times In 3 Years 66
mdsolar (1045926) writes with this disconcerting story from CNet about security breaches at the U.S. Nuclear Regulatory Commission, revealed in a new report to have been compromised three times in the last three years: The body that governs America's nuclear power providers said in an internal investigation that two of the hacks are suspected to have come from unnamed foreign countries, the news site Nextgov reported based on a Freedom of Information Act request. The source of the third hack could not be identified because the logs of the incident had been destroyed, the report said. Hackers, often sponsored by foreign governments, have targeted the US more frequently in recent years. A report (PDF) on attacks against government computers noted that there was a 35 percent increase between 2010 and 2013.
Intruders used common hacking techniques to get at the NRC's computers. One attack linked to a foreign country or individual involved phishing emails that coerced NRC employees into submitting their login credentials. The second one linked to a foreign government or individual used spearphishing, or emails targeted at specific NRC employees, to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive. The third attack involved breaking into the personal account of a NRC employee. After sending a malicious PDF attachment to 16 other NRC employees, one person was infected with malware.
Intruders used common hacking techniques to get at the NRC's computers. One attack linked to a foreign country or individual involved phishing emails that coerced NRC employees into submitting their login credentials. The second one linked to a foreign government or individual used spearphishing, or emails targeted at specific NRC employees, to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive. The third attack involved breaking into the personal account of a NRC employee. After sending a malicious PDF attachment to 16 other NRC employees, one person was infected with malware.
Good Job NRC (Score:5, Insightful)
The funny thing is, most NRC information is publicly available through their on-line document library. There is a very small amount of redacted intellectual property from various vendors that one might get a hold of, but any of those items are not really much different than the public information or useful to competitors. Doubts are any of these hackers would be able to do anything with it, as competitors generally already know what each other really are doing.
Safeguards & security information could theoretically be of value to a terrorist, but is not kept on any of these common servers. It is kept in isolated, stand-alone file rooms with isolated individual computers & file cabinets and controlled access.
I don't see really why this is any kind of news.
Re: Good Job NRC (Score:3)
Re: (Score:3)
Are you saying their email should be completely isolated from the public internet? How are they supposed to... use email?
Unless you think each person should have two email addresses from two domains.
Re: (Score:2)
Re: (Score:2)
So wait, why would the NRC even be a target then, unless the hackers were dumb enough to believe that the NRC would store sensitive information on a public-facing server?
Re: (Score:3)
The same reason people try to hack NASA to find the 'Truth' about aliens?
Re: (Score:2)
Re: (Score:2)
unless the hackers were dumb enough to believe that the NRC would store sensitive information on a public-facing server?
To be fair, very few organisations take security seriously, even when it's their entire job [explainxkcd.com].
It's not dumb of a hacker to make the assumption that their target is incompetent. Cynical, maybe, but not unfounded.
Re: (Score:2)
Well, I agree there is probably little of value there, however, I think you are missing what documents of value they do have. Specifically, information about their inspection program and any investigations they may be doing. That is data that, at least theoretically, has value to the subjects of any investigation or inspection.
Whether it is of real value or whether they would actually pay for it (or hire someone to get it) is another question entirely. I would have no problem believing that a few times a ye
Re:Good Job NRC (Score:4, Interesting)
But it is Nuclear! N U C L E A R ! ! ! This words means scary stuff will happen if ever used by Bad Bad Men!
Now the people who broke in may get a lot of good information just like if they broke into any other federal commission. However I would really hope the actual dangerous stuff isn't on the same network that allows any sort of internet access.
Re:Good Job NRC (Score:4, Funny)
Re: (Score:2)
> However I would really hope the actual dangerous stuff isn't on the same network that allows any sort of internet access.
You spelled Nuclear correctly, but if you want the DOH (Department Of Hope), it's down the hall between the DOWT (Department Of Wishful Thinking) and OMGTWB (Oh My God-That Went Boom!)
Good Job NRC (Score:1)
Thank you.
There's virtually nothing to be gained by illegitimately obtaining information from the NRC -- almost everything they produce is in the public domain. This is just FUD designed to scare anyone easily excited by the combination of the words "hacked" and "nuclear" in the same article.
Re: (Score:2)
mdsolar again? (Score:1)
"The few attempts documented in the OIG (Office of the Inspector General) cyber crimes unit report as gaining some access to NRC networks were detected and appropriate measures were taken," he said.
Re: (Score:3)
Why do we get a gloom and doom post on the front page from this guy every day? Besides, this is a non-story:
He doesn't care about the content, the agenda is to submit items in quantity and hope many just read the headlines. Unfortunately, some of those that accept articles here are willing to oblige that behavior.
Re: (Score:1)
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
http://slashdot.org/~Mr+D+from... [slashdot.org]
Re: (Score:2)
Re: (Score:2)
Skydrive? (Score:5, Insightful)
"to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive"
Why on earth would the NRC (or any company or government entity, for that matter) not block access to all cloud storage providers, except those which are explicitly authorized?
Re: (Score:2)
Re: (Score:2)
Yes, punish the victim, genius.
Re: (Score:2)
Put some AI out front ... (Score:2)
It's much easier to blame the victim than provide a technical solution?
Anyone heard of, "AI?"
How hard is it to emulate a user and take the phishing/spear phishing bait to conclusion inside a sandbox; make a call to the, "Not by the hair on my chinny chin chin," routine when the predicted results are deemed harmful?
I have to think of everything.
Re: (Score:2)
Re: (Score:2)
"to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive"
Why on earth would the NRC (or any company or government entity, for that matter) not block access to all cloud storage providers, except those which are explicitly authorized?
Blocking access to "all cloud storage providers" will likely cripple actual functionality the business is looking for now or in the future. On top of that, I don't know of many who do this. Hell, the CIA has their own cloud on AWS, so it's a bit funny to think the government would be asking their customers/partners/vendors to stay away.
And with the way data is shifting to cloud hosting solutions, at some point in the near future, it will become impossible to block the "cloud", as it will become part of th
Re: (Score:2)
Why on earth would the NRC (or any company or government entity, for that matter) not block access to all cloud storage providers, except those which are explicitly authorized?
My first job after college was working for a branch of the Department of Defense as a civilian. I was a programmer at first and then a Unix system admin. You may not know how tight Microsoft is with Uncle Sam so it could be that SkyDrive was or even still is deliberately allowed. I could certainly see Microsoft telling some big shot manager "This can only be a good thing you for you" and they signed off on it. My experience was that security was highly variable and depended on how serious the people res
Re: (Score:2)
You would think such stuff would be blocked but there are those in government (our current CIO one of them) who think, "The Cloud! The Cloud! It's wonderful!" without any concept of how insecure the Cloud really is.
People at the top read magazines and are told how wonderful such things are without taking a moment to think things through.
This applies to the private sector as well except you don't normally hear about their missteps.
Re: (Score:2)
Because if you block access to SkyDrive, you end up blocking access to being able to run the newest version of Microsoft Office. The servers that it uses to get (stream) content are the same ones that SkyDrive uses.
Another day, another mdsolar anti-nuclear troll (Score:4, Insightful)
Hapless government employees fall susceptible to phishing, but OMG NUCLEAR REGULATORS!!!111!!!1eleventyone!!1!
Why do I have a feeling that if this happened to any other Federal department, we'd never hear about it?
Re: (Score:1)
Oblig (Score:3)
Nuclear Information Security Inspector could be heard in the background saying "Doh!"
Words matter: email "coerced" someone? (Score:3)
Re: (Score:3)
I suppose, you could explain exactly what changes you think took place in their handling of this information since 9-11? I'm sure
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Some details (Score:4, Informative)
I thought I'd provide some anecdotal evidence for the sake of argument. I've worked at 3 major telephone companies/ISPs over the years and have been involved in installing phone and data lines at multiple power companies across the country including 1 reactor. In every case the power company had a standing police that basically boiled down to "No data enters the facility" It used to be a rule that "no copper entered the facility" but that changed with the advent of fiberoptics. I don't know if this is a law, or just a common security practice, but in the dozens of facilities I've worked with they were all air-gaped. Again, this is anecdotal, I don't know if this is done everywhere, but I certainly found it reassuring when I saw it.
On the other hand, I did work with a local municipality once that opened and closed the local damn with a single copper pair running between the control house and the damn. When the damn overflowed and flooded that copper pair rendering it inoperable, they were furious with us because we wouldn't "fix it" I had to explain to a local community leader that our field techs are not trained to use scubba gear and had we known the safety of the entire community was riding on a single $12/month copper pair we'd have likely suggested an alternative solution.
unnamed foreign countries???? (Score:3)
Re: (Score:2)
Hey you dumb asshats (Score:1)
Most American Blackhats use foreign country's connections to infiltrate American systems.
This is why every single fucking time they appear to come from "unnamed foreign countries" . Because wouldn't you want to appear like you are coming from China when in actuality you are sitting at a desk in new york city when owning these poor bastards?
I bet they paid a lot of money to "security professionals" to fix this though. lolololololol
Microsoft Windows Hacked 3 Times In 3 Years .. (Score:1)