Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Illegal Cryptocurrency Mining at Ukraine Nuclear Plant Exposed Sensitive Data

Sensitive information from a nuclear power plant in Ukraine was exposed due to an illegal cryptocurrency mining operation run by workers, according to several media reports.

Sensitive information from a nuclear power plant in Ukraine was exposed due to an illegal cryptocurrency mining operation run by workers, according to several media reports.

Local media reported that the Security Service of Ukraine (SBU) last month discovered unauthorized computer equipment at the South Ukraine Nuclear Power Station near the city of Yuzhnoukrainsk in the Mykolaiv province.

Investigators found that workers, possibly with assistance from some of the National Guard troops that protected the facility, were running a cryptocurrency mining operation. They were not using plant equipment — they took their own mining rigs into an administrative building — but they were using the organization’s electricity network to power their devices.

Cryptocurrency mining equipment requires a lot of power and entities involved in these types of activities often look for locations with inexpensive electricity.

In addition to stealing electricity from the power plant, the individuals responsible for the operation connected their equipment to the organization’s intranet and to the internet, which reportedly led to the exposure of classified information about the facility’s physical security. This type of information is said to represent a state secret.

Investigators uncovered video cards, switches, storage devices, power supplies, motherboards, and cables and other accessories in the room from where the operation was run.

Phil Neray, VP of Industrial Cybersecurity at CyberX, told SecurityWeek that the operation likely went undetected for months or even longer, exposing critical infrastructure to “potentially catastrophic safety issues.”

“This is a great example of ‘trust but verify’ — even with the strictest policies and regulations in the world, it’s all theoretical if you aren’t continuously monitoring for unusual or unauthorized activity,” Neray said.

Advertisement. Scroll to continue reading.

Incidents where employees of organizations in the nuclear sector have abused their privileges to mine for cryptocurrencies are not unheard of. Last year, engineers at the Russian Federation Nuclear Center were arrested for using one of the organization’s supercomputers to mine bitcoin.

In addition, it’s not uncommon for cryptocurrency mining malware to make its way onto industrial systems as part of non-targeted attacks.

Related: Coverity Scan Hacked, Abused for Cryptocurrency Mining

Related: Cryptocurrency Mining Malware Hits Monitoring Systems at European Water Utility

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...