US Acknowledges Cyber Attack On Nuclear Power Plant

The US Department of Energy (DOE) has acknowledged a campaign of attacks that targeted a number of energy companies, including at least one nuclear plant.

The government body said it was helping energy companies defend against the hackers, who it said had targeted administrative networks rather than the industrial control systems that control plants’ physical equipment.

Industry protection

“DOE is working with our government and industry partners to mitigate any impact from a cyber intrusion affecting entities in the energy sector,” the department said in a statement. “At this time, there has been no impact to systems controlling US energy infrastructure. Any potential impact appears to be limited to administrative and business networks.”

The department said it has supplied information about the incident to industry, providing technical details and ways of mitigating risks.

The US’ Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) said in a joint statement there was “no indication of a threat to public safety” because the attacks have targeted only business systems and not control software.

Security experts have long warned that countries’ critical infrastructure is at risk from attacks that could affect industrial control systems in sectors such as energy.

Nuclear target

The DOE’s comments followed reports by both Bloomberg and The New York Times citing unnamed US officials who said that at least a dozen US organisations were affected by the wave of attacks.

Those groups included the Wolf Creek nuclear facility in Kansas and a manufacturer of control systems for the energy sector, the reports said.

The DHS and FBI reportedly sent an alert on 28 June to companies warning of hacks targeting nuclear, power and critical infrastructure sectors.

They said it isn’t known who might be behind the attacks, describing the source only as an “advanced persistent threat”.


A separate technical DHS bulletin from 28 June included code used in a hacking tool that suggested hackers had tried to use a Wolf Creek employee’s password to access the company’s network.

Ukraine sabotage

The alert said hackers had been observed using booby-trapped emails to harvest credentials that could be used to access administrative networks.

The Wolf Creek plant told Reuters that the incident had had no affect on operations due to the control systems being “completely separate” from the corporate network.

Computer security firm FireEye said the same attackers appear to have targeted companies in Ireland and Turkey with targeted phishing attacks as far back as 2015, and conducted “watering hole” attacks aimed at infecting computers used by electrical engineers and control systems operators.

In December 2015 an attack on a Ukraine power company left parts of western Ukraine, including regional capital Ivano-Frankivsk, without power. Security experts later said that a sophisticated Trojan horse called Black Energy was used in the hack.

The Ukraine blamed the incident on Russia, but security firms have said that as yet no connection has been found between that attack and the more recent US campaign.

Do you know all about security in 2017? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

1 hour ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

4 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

5 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

6 hours ago