Malware found in Japanese nuclear power plant2014-03-21 | Comebuy News
Malware has been discovered in a computer of the Japanese nuclear power plant Monju. The Japan Atomic Energy Agency JAEA, which operates the fast breeder, confirmed the incident. Therefore, a server administrator on 2 January discovered a virus on the computer. The infection was probably according to the recent findings, after an employee was an update to a free software for video playback.
The infected PC - one recorded connection of eight computers in the control room - with a suspicious Web site outside of the power plant. Over 30 requests to go out seemed of South Korea took place five days after the update. More than 42,000 E-Mails and documents on staff training were stored on the computer.
The Japanese nuclear regulatory Commission NISA had already repeated reason to indicate lack of security procedures in Monju. Only in November, regulators admonished the JAEA because their anti-terrorism measures for the fast breeder reactor in Monju were inadequate. Security guidelines for the protection of nuclear material had been disregarded.
Built in 1985 and taken in the fall of 1994 in operating nuclear power plant Monju in the town of Tsuruga in Fukui Prefecture has a long history of very serious incidents and repeated closures. A good message is therefore no doubt that regulators prohibited the reopening in March 2013, because of the plant's safety culture have deteriorated too much.
Even the headquarters of the Monju operator JAEA in Tokaimura in Ibaraki Prefecture was not spared from malware. A computer with a computer virus infection was noticed there already in November 2012.
[with material by David Gewirtz, ZDNet.com]