Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?



Illegal Cryptocurrency Mining at Ukraine Nuclear Plant Exposed Sensitive Data

Sensitive information from a nuclear power plant in Ukraine was exposed due to an illegal cryptocurrency mining operation run by workers, according to several media reports.

Sensitive information from a nuclear power plant in Ukraine was exposed due to an illegal cryptocurrency mining operation run by workers, according to several media reports.

Local media reported that the Security Service of Ukraine (SBU) last month discovered unauthorized computer equipment at the South Ukraine Nuclear Power Station near the city of Yuzhnoukrainsk in the Mykolaiv province.

Investigators found that workers, possibly with assistance from some of the National Guard troops that protected the facility, were running a cryptocurrency mining operation. They were not using plant equipment — they took their own mining rigs into an administrative building — but they were using the organization’s electricity network to power their devices.

Cryptocurrency mining equipment requires a lot of power and entities involved in these types of activities often look for locations with inexpensive electricity.

In addition to stealing electricity from the power plant, the individuals responsible for the operation connected their equipment to the organization’s intranet and to the internet, which reportedly led to the exposure of classified information about the facility’s physical security. This type of information is said to represent a state secret.

Investigators uncovered video cards, switches, storage devices, power supplies, motherboards, and cables and other accessories in the room from where the operation was run.

Phil Neray, VP of Industrial Cybersecurity at CyberX, told SecurityWeek that the operation likely went undetected for months or even longer, exposing critical infrastructure to “potentially catastrophic safety issues.”

Advertisement. Scroll to continue reading.

“This is a great example of ‘trust but verify’ — even with the strictest policies and regulations in the world, it’s all theoretical if you aren’t continuously monitoring for unusual or unauthorized activity,” Neray said.

Incidents where employees of organizations in the nuclear sector have abused their privileges to mine for cryptocurrencies are not unheard of. Last year, engineers at the Russian Federation Nuclear Center were arrested for using one of the organization’s supercomputers to mine bitcoin.

In addition, it’s not uncommon for cryptocurrency mining malware to make its way onto industrial systems as part of non-targeted attacks.

Related: Coverity Scan Hacked, Abused for Cryptocurrency Mining

Related: Cryptocurrency Mining Malware Hits Monitoring Systems at European Water Utility

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...