Infected PC leaks nuclear secrets
Sensitive information about nuclear power plants has been leaked over the internet from a virus-infected computer.
Sensitive information about nuclear power plants has been leaked over the internet from a virus-infected computer.
According to the Japanese press, approximately 40Mbytes' worth of confidential reports related to nuclear power plant inspections over several years was leaked from a virus-infected computer belonging to an employee of Mitsubishi Electric Plant Engineering.



From forensic cyber to encryption: InfoSec17
Security technologist Bruce Schneier’s insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken’s comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
The data is said to have been distributed to users of the Winny peer-to-peer file-sharing system. Winny is one of the most popular file-sharing networks in Japan, with over 250,000 users.
According to officials, the leak occurred when a 30-year-old engineer used his home PC for company business. The PC was infected with an unnamed computer virus which is said to have enabled Winny users across Japan to access the sensitive information.
The leaked data included photographs of the insides of nuclear power plants and the names and addresses of inspecting engineers.
“The fall-out from this breach acts as an unpleasant reminder that all businesses need to take computer security seriously. If you allow your employees to put sensitive company data onto their own home computers, you are running the risk that they will not be as well defended as the PCs within your organisation,” said Graham Cluley, senior technology consultant at security software company Sophos.
“Security at power plants should be at an all-time high, but it needs to extend beyond the physicality of barbed wire and high walls and encompass information security too,” he added.
Sites referred to in the leaked data include Kansai’s Mihama nuclear plant and a power station in Tsuruga, as well as pressurised water reactors in Tomari and Sendai.
Read more on IT risk management
-
Why businesses must think like criminals to protect their data
-
Security Think Tank: Use awareness, education and controls to halt cryptojacking
-
Security Think Tank: Awareness is a good starting point to counter fileless malware
-
Security Think Tank: Human, procedural and technical response to fileless malware
Start the conversation
0 comments