Popular Posts

Blog Archive

Search This Blog

North Korean hacker group Target Indian Nuclear Power Plant

Share it:

Hackers Target Indian Nuclear Power Plant

The Kudankram nuclear power plant is a nuclear power plant in Tamil Nadu, the southern tip of India, and commercial operation has started in December 2014. Security expert Pukhraj Singh , former analyst at an Indian government agency, suggested on Twitter that India was a cyber attack on September 7, 2019. Furthermore, on October 28, 2019, Mr. Singh said, `` There was domain control level access at Kudankram nuclear power plant, '' and many Twitter users and Indian opposition politicians asked the government to explain thing. 

According to Pukhraj, the malware managed to gain domain controller-level access at the nuclear facility.

What is the Dtrack malware (linked to the North Korean hackers)?

According to a previous report published by researchers at Kaspersky, Dtrack is a remote access Trojan (RAT) intended to spy on its victims and install various malicious modules on the targeted computers, including:

  • keylogger,
  • browser history stealer,
  • functions that collect host IP address, information about available networks and active connections, list of all running processes, and also the list of all files on all available disk volumes.

Dtrack allows remote attackers to download files to the victim's computer, execute malicious commands, upload data from the victim's computer to a remote server controlled by attackers, and more.

According to the researchers, Dtrack malware was developed by the Lazarus Group, a hacking group believed to be working on behalf of North Korea's state spy agency.

How did the Indian Government respond?

Immediately after Pukhraj's tweet, many Twitter users and Indian opposition politicians, including Congress MP Shashi Tharoor, demanded an explanation from the Indian Government about the alleged cyberattack — which is never disclosed to the public.



Share it:

Tech News