Skip to Content

Hackers Have Been Targeting U.S. Nukes

This could be the warm-up act for something larger.

A series of cyberattacks has been leveled at the computer networks of American nuclear power plants.

The New York Times reveals that the Department of Homeland Security and the Federal Bureau of Investigation have reported a number of hacks targeting companies that run U.S. energy facilities over the past two months, including the Wolf Creek nuclear plant in Kansas. 

The attacks appear to have used a variety of techniques to gain access to computer systems. They include phishing attacks, which sent malicious code inside Microsoft Word documents via e-mail, along with so-called watering hole attacks, which compromise websites known to be used by targeted staff members.

So far, it appears that hackers gained access to office computer systems but failed to take control of devices that are used to operate of any of the facilities. So right now, the hacks are worrying rather than dangerous. The reports do, however, suggest that the hackers may have been using the opportunity to map networks, which could be used as intelligence for future attacks.

It’s important to not overstate the threat posed by the hacks, which hit administrative systems rather than industrial control computers. It’s unclear what the motive behind the attacks was, but they nonetheless raise fears that hackers could at some point in the future shut down parts of the American energy grid, or, less likely, undermine safety systems on nuclear facilities.

The news adds to concerns raised by recent attacks on energy infrastructure in Ukraine, which were considered by many to be test runs for taking down facilities in other countries. Research suggests that some of the malware tools developed by hackers and used against Ukrainian systems could prove to be a potent threat to industrial systems around the world, though no link has yet been drawn to the new American hacks.

Currently it’s unclear who is responsible for the hacks. But according to three people familiar with the attacks that spoke to Bloomberg, “the chief suspect is Russia.” The Times, meanwhile, points out that the DHS and FBI say that it was carried out by an “advanced persistent threat”—which is usually shorthand for a hacking collective that’s supported by a nation state.

(Read more: New York Times, Bloomberg, “Ukraine’s Power Grid Gets Hacked Again, a Worrying Sign for Infrastructure Attacks,” “A Hack Used to Plunge Ukraine Into Darkness Could Still Do Way More Damage”)

Keep Reading

Most Popular

DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.

“This is a profound moment in the history of technology,” says Mustafa Suleyman.

What to know about this autumn’s covid vaccines

New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.

Human-plus-AI solutions mitigate security threats

With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure

Next slide, please: A brief history of the corporate presentation

From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.