“Attack campaign” against U.S. nuclear workers’ computers — Malware installs broader and more ambitious than previously thought — Began nearly 2 months ago

Published: May 6th, 2013 at 7:16 pm ET
By
Email Article Email Article
15 comments


Ars Technica, May 3, 2013 (h/t Anonymous tip): Internet Explorer zero-day exploit targets nuclear weapons researchers [...]  Attackers exploited a previously unknown and currently unpatched security bug in Microsoft’s Internet Explorer browser to surreptitiously install malware on the computers of federal government workers involved in nuclear weapons research, researchers said on Friday. [...]

Ars Technica, May 6, 2013: Internet Explorer 0-day attacks on US nuke workers hit 9 other sites [...] The revelation, from a blog post published Sunday by security firm AlienVault, means an attack campaign that surreptitiously installed malware on the computers of federal government workers involved in nuclear weapons research was broader and more ambitious than previously thought. [...] A separate blog post from security firm CrowdStrike said its researchers unearthed evidence suggesting that the campaign began in mid-March. [...] Malicious links embedded in the Department of Labor website focused on webpages that dealt with illnesses suffered by employees and contractors developing atomic weapons for the Department of Energy. But they went on to say the campaign could be much broader. [...]

See also: Homeland Security: 2 U.S. power plants victim of cyber attack -- Reports: Occurring at alarming rate... "Reminiscent of Stuxnet"

Published: May 6th, 2013 at 7:16 pm ET
By
Email Article Email Article
15 comments

Related Posts

  1. U.S. Nuclear Expert: We are currently experiencing a cyber attack — Email system also compromised February 1, 2013
  2. Fairewinds: Website is under verified DDS attack — Another nuclear expert’s site had similar problems — Both involved with San Onofre issue — “What is the nuke industry hiding?” February 1, 2013
  3. TV: Leaking tank at U.S. nuclear site may be in far worse condition than previously known — Workers shocked by new findings #Hanford June 21, 2013
  4. ‘Terrorists’ reach nuclear bomb material at U.S. facility during mock attack August 3, 2013
  5. Attack at U.S. nuclear plant? Multiple shots fired at security officer — May have fled in boat — FBI sending team to site — “Many of the details I won’t be able to share” April 21, 2013

15 comments to “Attack campaign” against U.S. nuclear workers’ computers — Malware installs broader and more ambitious than previously thought — Began nearly 2 months ago

You must be logged in to post a comment.