Indian nuclear power plant confirms North Korean malware on its network

This is AI generated summarization, which may have errors. For context, always refer to the full article.

Indian nuclear power plant confirms North Korean malware on its network
The malware, Dtrack, affects the Kudankulam Nuclear Power Plant's administrative network and not the internal network controlling the reactors

MANILA, Philippines – The Nuclear Power Corporation of India Limited (NPCIL) confirmed Wednesday, October 30, some of its systems had been affected by malware made by state-sponsored hackers from North Korea, ZDNet reported.

Reports of the Kudankulam Nuclear Power Plant (KNPP) being infected were circulating Monday, after Pukhraj Singh, a former security analyst for the country’s National Technical Research Organization noted a malware infection at KNPP.


Security researchers said the malware was called Dtrack, which is a form of backdoor trojan made by North Korea’s Lazarus Group.


Officials at the power plant originally denied being affected by the malware, but the NPCIL – the KNPP’s parent company – eventually released a statement confirming Dtrack hit its administrative network but not its internal network, which is used to control the nuclear reactors of the plant.  

Dtrack is generally seen as a tool for network reconnaisance, and as a means of inserting more powerful malware into infected systems, usually for financial gain.

The malware infection at the power plant, while seemingly severe, may have thus been accidental. Kaspersky in September reported on Dtrack and other similar malware being seen in India’s financial sector. –

Add a comment

Sort by

There are no comments yet. Add your comment to start the conversation.

Summarize this article with AI

How does this make you feel?

Download the Rappler App!