Security

UK government denies China/Russia nuke plant hack claim

Report suggests Sellafield compromised since 2015, response seems worryingly ignorant of Stuxnet


The government of the United Kingdom has issued a strongly worded denial of a report that the Sellafield nuclear complex has been compromised by malware for years.

The report, appearing in The Guardian, claimed that the controversial complex was hacked by "cyber groups closely linked to Russia and China," with the infection detected in 2015 but perhaps present before that year.

The report claimed that "sleeper malware" was embedded in unspecified systems, potentially compromising info on movement of nuclear materials and matters related to safety.

A UK government statement insists "We have no records or evidence to suggest that Sellafield Ltd networks have been successfully attacked by state-actors in the way described by the Guardian," adding "Our monitoring systems are robust and we have a high degree of confidence that no such malware exists on our system."

"All of our systems and servers have multiple layers of protection," reads one of the rebuttal's bullet points. Another adds "Critical networks that enable us to operate safely are isolated from our general IT network, meaning an attack on our IT system would not penetrate these."

The Guardian's report mentioned infections in "IT systems" and malware "embedded in Sellafield's computer networks."

But it is not clear if those systems and networks are isolated, per the government response.

The rebuttal's info about the isolation of some of Sellafield's IT estate is also of dubious value, given that the most infamous attack on a nuclear facility – the Stuxnet infection of Iranian uranium enrichment factories – is thought to have been carried out using malware-laced removable storage devices to get across air gaps.

Nor does the rebuttal address all the issues in the Guardian report, which claimed Sellafield "was last year placed into a form of 'special measures' for consistent failings on cyber security, according to sources at the Office for Nuclear Regulation (ONR) and the security services."

The ONR has posted its own comment on the story, but it does not directly address the allegation of "special measures."

It does, however, state that the Office has "been clear that there are areas where improvements are required to achieve the high standards of safety and security we expect to see, but there is no suggestion that this is compromising public safety."

"In relation to cyber security, Sellafield Ltd is currently not meeting certain high standards that we require, which is why we have placed them under significantly enhanced attention," the doc adds, winding up with news that "Some specific matters are subject to an ongoing investigation process, so we are unable to comment further at this time." ®

Send us news
26 Comments

Ukraine cyber spies claim Putin's planes are in peril as sanctions bite

Aeroflot fleet still has a smoking section, but not for tobacco

US lawmakers want blanket denial for sensitive tech export licenses to China

Committee worries licenses are being issued to boost and suit business, not national security

Today's 'China is misbehaving online' allegations come from Google, Meta

Zuck boots propagandists, Big G finds surge of action directed at Taiwan

China's first undersea datacenter sinks – as planned

PLUS: India's landmark digital law delayed; Singaporean banks de-digitize some accounts; AUKUS to unleash AI

Microsoft hikes prices across Asia

PLUS: Japan Moon landing scheduled; Mastercard's APAC pay-by-face trial; Scammers feast on restaurant QR code

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Chinese boffins pitch quadcopter for Mars sample return mission

In the race for the Red Planet, NASA is falling behind

Beijing fosters foreign influencers to spread its propaganda

They get access to both China's internet and global platforms, and cash in on both

After bashing Nvidia for ‘arming’ China, Cerebras's backer G42 alarms US govt with suspected Beijing ties

What was it they say about folks in silicon houses?

Cisco whips up modded switch to secure Ukraine grid against Russian cyberattacks

GPS-jamming tactics were doing much more than simply scrambling missile guidance systems

Hollywood plays unwitting Cameo in Kremlin plot to discredit Zelensky

Microsoft spots surge in pro-Russia exploits of video platform to spread propaganda

China's Loongson debuts processor that 'matches Intel silicon circa 2020'

Best not to dismiss it, as Asus looks to be onboard and advances are promised