“Attack campaign” against U.S. nuclear workers’ computers — Malware installs broader and more ambitious than previously thought — Began nearly 2 months ago

Published: May 6th, 2013 at 7:16 pm ET


Ars Technica, May 3, 2013 (h/t Anonymous tip): Internet Explorer zero-day exploit targets nuclear weapons researchers […]  Attackers exploited a previously unknown and currently unpatched security bug in Microsoft’s Internet Explorer browser to surreptitiously install malware on the computers of federal government workers involved in nuclear weapons research, researchers said on Friday. […]

Ars Technica, May 6, 2013: Internet Explorer 0-day attacks on US nuke workers hit 9 other sites […] The revelation, from a blog post published Sunday by security firm AlienVault, means an attack campaign that surreptitiously installed malware on the computers of federal government workers involved in nuclear weapons research was broader and more ambitious than previously thought. […] A separate blog post from security firm CrowdStrike said its researchers unearthed evidence suggesting that the campaign began in mid-March. […] Malicious links embedded in the Department of Labor website focused on webpages that dealt with illnesses suffered by employees and contractors developing atomic weapons for the Department of Energy. But they went on to say the campaign could be much broader. […]

See also: [intlink id=”homeland-security-2-u-s-power-plants-victim-of-cyber-attack-reports-occurring-at-alarming-rate-reminiscent-of-stuxnet” type=”post”]{{empty}}[/intlink]

Published: May 6th, 2013 at 7:16 pm ET


Related Posts

  1. U.S. Nuclear Expert: We are currently experiencing a cyber attack — Email system also compromised February 1, 2013
  2. TV: Leaking tank at U.S. nuclear site may be in far worse condition than previously known — Workers shocked by new findings #Hanford June 21, 2013
  3. Fairewinds: Website is under verified DDS attack — Another nuclear expert’s site had similar problems — Both involved with San Onofre issue — “What is the nuke industry hiding?” February 1, 2013
  4. ‘Terrorists’ reach nuclear bomb material at U.S. facility during mock attack August 3, 2013
  5. Attack at U.S. nuclear plant? Multiple shots fired at security officer — May have fled in boat — FBI sending team to site — “Many of the details I won’t be able to share” April 21, 2013

15 comments to “Attack campaign” against U.S. nuclear workers’ computers — Malware installs broader and more ambitious than previously thought — Began nearly 2 months ago

  • Jebus Jebus

    Maybe they should quit surfing for pxrn…

    N-Lab Worker Charged Over Computer Pxrn


    Former nuclear fuel company head sentenced for child pxrn


    5200 Pentagon workers caught with child pxrn


    Any questions?

    • DUDe DisasterInterpretationDissorder

      Thank you Jebus , another part of the puzzle of pattern's.

  • DUDe DisasterInterpretationDissorder

    Like deliberatly killing the planet was not enough to show us they're sick …
    All this extiction setup behaviour is a cry for help really , a symptom ,
    too bad soon there will be nobody alive to cure them…

  • pcjensen

    freaks – all ought to be drug tested (not random) and put 24/7 monitors on all work stations – from the lowest paid employee, contractors included, to the top Chiefs. fire them immediately for any breach. the most dangerous tech and we see this? total loss of control. Hear that Feds? Law ought be breathing down all necks.

    • gr81 gr81

      Thanks for helping to usher in our POLICE STATE!

      And remember, the cops come from the populous, thus maintain about the same cross section of "good" and "bad".

      • DUDe DisasterInterpretationDissorder

        I understand what you mean gr81 .
        A lot of various people are desperate from realising the truth of our destiny as it becomes more and more visible , and depending on their "skills" try different "actions" .
        One could argue that every whistleblower or truth-blogger is also speeding up the nazi-controlled internet , world etc..
        Just by upholding the sick nature of the "masterplan" to the public…
        Forwards , increasing pressure is the way to go !
        Diversity in the way's it is done , "can" have its own benefits , counterattack-wise…but is indeed not absolute a wise thing perse..
        Just like it is not wise to call for a flat-out civil war..

  • Jebus Jebus

    lol at the top of google news, is it OT?

    Here's yer sign…

    Head of Air Force's anti-sexual assault unit arrested for sexual battery


    With that I DO, respect those upstanding young people who are burdened with the directorates of their commanders and our(?) country, performing their jobs everyday, in the finest military in the world…

  • RememberThis RememberThis

    I cant beleive they use IE….dont monitor their ports and scan for malware real time.


  • AGreenRoad AGreenRoad

    It was all good when the US and Israel attacked Iranian nuclear facilities, but now it does not feel as good, when they turn those weapons against the originators…

    Karma sucks..

    We hope that the result will not be a nuclear meltdown. It certainly seems that there are a LOT of problems with quick shutdowns and emergencies of all kinds at US nuke plants nowadasy.

  • AGreenRoad AGreenRoad

    If the Iranian nuke facility explosion was no accident, what will prevent the Iranians or others who have been mistreated in a variety of ways from trying something, as payback?

    What will prevent nations from trying to 'take out' each other's nuke facilities out with spies, high tech tools, and/or malware, now that the US has opened that door?

    The costs to protect these global life extinction facilities will have to go up drastically in order to prevent a disaster on the scale of Fukushima, or worse.

    Nuclear Accidents, Recycling Nuclear Weapons/Fuel

    Iranian Fordow Uranium Enrichment Facility Explosion, Radiation Leak, Evacuation of 1.5 Million? via @AGreenRoad