Skip to main content

Don’t have a meltdown, but German officials just found malware in a nuclear reactor

german nuclear power plant virus french station
Image used with permission by copyright holder
Officials at a German nuclear power plant found a grip of malware on an official system, according to a report from Reuters.

The plant in question, Gundremmingen, lies about 75 miles outside of Munich. The infected computer was installed in 2008 for visualizing data associated with transporting fuel rods, but by now is probably being carefully disassembled and disposed of.

Recommended Videos

Despite the pile of infections taking up space on the computer, nothing about the plant’s operation was compromised. That’s because the computer, which was used for visualizing fuel rod data, wasn’t connected to the Internet. None of the dangerous malware was activated, so the only way it could have spread was through USB drives.

Speaking of which, the German officials identified 18 USB drives that were also infected. Again, the infections weren’t causing issues, as they were all used on systems outside of the Internet’s domain.

Some of the malware found on the system is particularly nasty. W32.Ramnit, a virus Symantec first identified in January of 2010, travels through removable drives, and attempts to capture social media and banking passwords in browsers. Another worm, Conficker, was first discovered in 2010, and attempts to use the machine as part of a botnet, usually for denial of service attacks. It’s a keylogger as well, typically targeting users on social media.

But without a connection to the Internet, none of the malware could be activated. Even if it was, the machine wasn’t used for banking or social media, so the keylogging and botnet functions would’ve been effectively useless. Power plant officials have stepped up cyber security around all of its systems in response.

Nuclear power plants definitely come in near the top of the list of facilities I don’t want a virus to infect, and it’s not hard to see why they might be a target for hackers. In this case, the German power plant was lucky that particular system had an air gap between itself and other machines.

Brad Bourque
Former Digital Trends Contributor
Brad Bourque is a native Portlander, devout nerd, and craft beer enthusiast. He studied creative writing at Willamette…
Don’t waste your money on a MacBook Air. Just buy a Chromebook instead
A young man using the HP 14-Inch 2-in-1 Chromebook.

The MacBook Air is an overpriced web browser. There, I said it. I did not want to go in this direction, but after six months of reading about Apple’s M2 MacBook Air, I could not hold it in anymore.

Most people who get a MacBook Air do not really need it. If all you do is check your email, write documents, play with Excel or Google Sheets, and watch YouTube, then save your money -- because a Chromebook is all you need.

Read more
Here’s why Nvidia’s shots against AMD drivers just don’t add up
Three RTX 4080 cards sitting on a pink background.

Nvidia is no stranger to criticizing AMD, and more recently, Intel, as the three companies duke it out for the best graphics cards. Earlier this year, Nvidia jabbed at AMD for its drivers, claiming that optional or beta drivers (which AMD frequently releases) are "sub-par" and don't provide a "smooth user experience."

And Nvidia is at it again, shortly before AMD is set to release its new RX 7900 XTX graphics card.

Read more
This game lets hackers attack your PC, and you don’t even need to play it
Genshin Impact characters.

Hackers have been abusing the anti-cheat system in a massively popular game, and you don't even need to have it installed on your computer to be affected.

The game in question is called Genshin Impact, and according to a new report, hackers are able to utilize the game's anti-cheat measures in order to disable antivirus programs on the target machine. From there, they're free to conduct ransomware attacks and take control of the device.

Read more