• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Hackers break into Nuclear Regulatory Commission computers

Leaked internal investigation report chronicles security woes

nuclear
Hackers hit Nuclear Regulatory Commission with phishing attacks
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 19 August 2014
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Hackers have successfully infiltrated Nuclear Regulatory Commission (NRC) computers twice in the past three years, according to a leaked internal investigation report.

News of the breaches broke via Nextgov, which claims to have learned of the breaches after issuing open records requests to the NRC. At the time of publishing the NRC had not responded to V3's request for comment.

The report showed that the NRC was successfully hacked by two foreign attackers during one incident, and a single "unidentifiable individual" during the other.

One of the incidents saw the attacker mount a sophisticated phishing email campaign that targeted roughly 215 NRC employees, designed to steal their account login credentials. More than 12 NRC employees are listed as "taking the bait".

The campaigns also saw hackers attempt to trick employees into downloading malware hosted in a Microsoft SkyDrive account, via a malicious PDF file attachment.

It is unclear when the attacks occurred or what country the hackers came from. The report contains no information about whether the attacks were state sponsored and mounted by a cyber criminal gang, or launched by lone wolf hackers.

Attacks on critical infrastructure facilities are a growing threat facing governments and business of all sizes. Over the past year researchers have uncovered numerous fresh campaigns targeting power plants.

FireEye discovered a new variant of the Havex malware in July, which included a dangerous open-platform communication (OPC) scanner that could be used to launch cyber attacks against critical infrastructure areas.

Earlier in July the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) urged critical infrastructure firms to check their networks for signs of intrusion after another cyber attack tool was uncovered.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Government
  • Hacking
  • cyber-crime
  • malware
  • phishing

V3 Latest

Apple acquires Coherent Navigation to bolster Apple Maps
Apple execs admit 'embarrassment' over Maps debacle

Eddy Cue and Craig Federighi open up about failure of product and what they learned

  • Operating Systems
  • 11 August 2016
Microsoft Windows XP boxes on the assembly line in 2001
Windows XP: 7 reasons ancient OS refuses to die

Despite being launched in 2001, and support ending in 2014, the platform remains deeply popular - but why?

  • Operating Systems
  • 11 August 2016
Google Chrome logo
Google to end Adobe Flash support in Chrome from next month

Version 53 will block Flash content across sites

  • Web
  • 10 August 2016
shutterstock-278162441
Google considers ways to stop VR trolling and abuse

Firm's Daydream Labs experimenting with a number of technologies

  • Gadgets
  • 10 August 2016
blog comments powered by Disqus
Back to Top

Most read

credit-card
Oracle hack potentially compromises almost every US credit card
TechEd 2014 Microsoft logo
Patch Tuesday: Microsoft releases nine updates as yearly total passes 100
Apple iPhone SE 10 most exciting features
Apple iOS market share grows on iPhone SE success
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
BlackBerry DTEK50
BlackBerry DTEK50 review
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016