Skip to Content

Hackers Have Been Targeting U.S. Nukes

This could be the warm-up act for something larger.

A series of cyberattacks has been leveled at the computer networks of American nuclear power plants.

The New York Times reveals that the Department of Homeland Security and the Federal Bureau of Investigation have reported a number of hacks targeting companies that run U.S. energy facilities over the past two months, including the Wolf Creek nuclear plant in Kansas. 

The attacks appear to have used a variety of techniques to gain access to computer systems. They include phishing attacks, which sent malicious code inside Microsoft Word documents via e-mail, along with so-called watering hole attacks, which compromise websites known to be used by targeted staff members.

So far, it appears that hackers gained access to office computer systems but failed to take control of devices that are used to operate of any of the facilities. So right now, the hacks are worrying rather than dangerous. The reports do, however, suggest that the hackers may have been using the opportunity to map networks, which could be used as intelligence for future attacks.

It’s important to not overstate the threat posed by the hacks, which hit administrative systems rather than industrial control computers. It’s unclear what the motive behind the attacks was, but they nonetheless raise fears that hackers could at some point in the future shut down parts of the American energy grid, or, less likely, undermine safety systems on nuclear facilities.

The news adds to concerns raised by recent attacks on energy infrastructure in Ukraine, which were considered by many to be test runs for taking down facilities in other countries. Research suggests that some of the malware tools developed by hackers and used against Ukrainian systems could prove to be a potent threat to industrial systems around the world, though no link has yet been drawn to the new American hacks.

Currently it’s unclear who is responsible for the hacks. But according to three people familiar with the attacks that spoke to Bloomberg, “the chief suspect is Russia.” The Times, meanwhile, points out that the DHS and FBI say that it was carried out by an “advanced persistent threat”—which is usually shorthand for a hacking collective that’s supported by a nation state.

(Read more: New York Times, Bloomberg, “Ukraine’s Power Grid Gets Hacked Again, a Worrying Sign for Infrastructure Attacks,” “A Hack Used to Plunge Ukraine Into Darkness Could Still Do Way More Damage”)

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.