Malware detected in NPCIL system, isolated

As per Department of Atomic Energy (DAE), a malware was identified in state-run Nuclear Power Corporation of India Limited (NPCIL) system at Kudankulam Nuclear Power Plant (KKNPP), Tamil Nadu. The matter was conveyed to the DAE by Indian Computer Emergency Response Team (CERT-In) on 4 September 2019 and was immediately investigated by DAE specialists.

Key Highlights

The identification of malware in NPCIL system was correct but the affected system was not connected to plant system. Thus NPCIL plant systems are not affected and networks are being continuously monitored.

The DAE specialists’ investigation revealed that infected PC belonged to a user who was connected in internet connected network used for administrative purposes and it is isolated from critical internal network of NPCIL system. The networks are now being continuously monitored. Investigation also confirmed that plant systems are not affected.

About Kudankulam Nuclear Power Plant (KKNPP)

It is located 650km south of Chennai, in Tirunelveli district, Tamil Nadu. It is being developed by Nuclear Power Corporation of India (NPCIL). The NPCIL works under the DAE, which in turn comes under purview of prime minister’s office (PMO).

Kudankulam is one of the leading operational nuclear plants of India. Atomstroyexport, is the supplier of equipment and fuels for the nuclear power project. It is a subsidiary of Russian State Nuclear Energy Corporation Rosatom.

Its unit-1 and unit-2 are already operational and connected to grid while Unit-3 and unit-4 are being constructed with help of Russia and preparatory work for construction of unit-5 and unit-6 is under process. At present India has 22 nuclear reactors in operation in 7 nuclear plants, having a total installed capacity of 6,780 MW and has another 21 reactors in various stages of construction and development.


Month: 

Leave a Reply

Your email address will not be published. Required fields are marked *