advertisement
The cyber attack by suspected North Korea-based hackers on the Kudankulam Nuclear Power Plant in September was intended specifically for information theft and The Quint has now been told that the actors were able to steal technology-related data from the plant’s IT systems.
IssueMaker Labs, an expert group of malware analysts based in South Korea who have tracked the North Korean actors suspected to be behind the attack since 2008, told The Quint that the actors were backed by the North Korean government and stole data by deploying a malware designed for data theft.
“We have found that Nuclear Power Plant technology-related data has been taken,” Simon Choi, founder of IssueMaker Labs told The Quint.
Adding to this, Choi said they found evidence that “the hackers of North Korea disguised as employees of Atomic Energy Regulatory Board (AERB) and Bhabha Atomic Research Centre of India (BARC) and sent hacking mails to their chairmen and other senior experts”. This includes nuclear scientists like Anil Kakodkar and former chairman of AERB, SA Bharadwaj.
IssueMakers Lab, which has shared substantial evidence on Twitter of North Korea’s role, said they also found evidence of more than one group of North Korean hackers working together to first conduct reconnaissance and subsequently deploy the malware.
India’s National Cyber Security Coordinator Lt. Gen. Rajesh Pant, responded to questions from The Quint stating that an “inquiry was in progress” on the matter.
The Nuclear Power Corporation of India Limited (NPCIL), which runs the plant in Tamil Nadu, on Wednesday, 30 October, confirmed that the “identification of malware in NPCIL system is correct”. This confirmation came after a denial on 29 October that “any attack on the Nuclear Power Plant Control System is not possible”.
Experts who had raised the alarm about a cyber breach on 3 September, however, clarified that there was no claim made that an attack had taken place on the critical control systems of the plant.
A nuclear power plant typically consists of two distinct networks. One network, known as the operation technology (OT), controls the actual running of the machine and reactors responsible for power generation. This part of the plant’s operations is air-gapped, meaning they are not connected to outside computers and was not breached.
The NPCIL’s statement also clarified that the infected computer belonged to a user who was connected to the internet. This Internet network was “isolated from the critical internal network”, the press release said.
The Quint had reported on 4 November that the South Korean malware analysts had shared evidence and analysis to buttress the claim that North Korea-based actors were indeed behind the cyber attack on the nuclear plant.
In a series of tweets since 30 October, the Lab has shared the following information:
The Quint has learnt new information that adds to what is known about the cyber attack so far. The information serves to provide greater clarity on who is behind the attack, how it was carried out, why they attacked India’s largest civilian nuclear plant and what the impact was.
Who Exactly Was Behind the Attack?
Choi, who has tracked the hacker group that allegedly attacked the nuclear plant for over a decade, said it was not one but two separate groups who worked together on this. Moreover, while the attack had been attributed to the Lazarus group, Choi said that technically the perpetrators are a separate group.
Choi said that “there are approximately seven hacker groups in North Korea. Generally we call the group which had attacked South Korea's government website in 2009 and Sony Pictures in 2014 as “Group A”, which is more commonly referred to as “Lazarus Group”.
According to Choi “these two groups are controlled by North Korean government and they can be considered as one.”
“There is also a “Group C” which attacked Korea Hydro and Nuclear Power Co Ltd in 2014. This Group C started attacking India's nuclear power plant-related persons from last year,” he further added.
How Was It Carried Out?
Choi said that the evidence they gathered suggests the attack on KKNPP was carried out by Group B and C's association. He said that while Group C was involved in reconnaissance over the last one year and sending malware to senior nuclear scientists, Group B was the one to deploy the malware on the plant’s IT systems.
“When Group C gets authority by reconnaissance done on people associated with the nuclear power plant, they hand over this data collected to Group B,” Choi said.
So, how did Group C go about allegedly hacking senior scientists?
“Then Group B extorts the confidential documents from NPP system. So the malware found in NPP system is Group B's malware,” he added.
Why Did They Attack Kudankulam?
According to tweets put out by IssueMakers Lab, a strong assumption for the motive of the attack could be theft of information on thorium-based nuclear power.
Corroborating this claim, Pukhraj Singh had told The Quint, “The remit of the actor was technology theft, but a motivated adversary hell-bent on power projection would have just waltzed in too.”
What Was The Impact?
The big question was, if North Korea-based actors have indeed launched a cyber attack whose remit was to steal intelligence and information, then were they successful in doing so?
Yes they were, according to Choi and other experts at Issue Makers Lab.
Cybersecurity researcher Anand Venkatanaryanan told The Quint that “D-Track is a data-theft malware. Issue Maker Labs has been tracking North Korea for a long time. All the data points, malware reverse engineering and the analysis along with the IP address used point very clearly to the North Korean involvement.”
“While attribution in Cyber is hard, this is as good as it gets. If we needed more confirmation, we would need human spies within the North Korean security establishment,” Venkatanarayanan added.
Established in 2008, the South Korea-based IssueMakers Labs operates as a non-profit intelligence organisation comprising an expert group of malware analysts. According to the Lab’s Twitter bio, the experts have been engaged in researching North Korea's cyber warfare capabilities since 2008.
Cybersecurity expert Pukhraj Singh, who was the first to raise alarm bells about the cyber attack at KKNPP, told The Quint said this of the South Korean organisation:
Singh has served at the National Technical Research Organisation (NTRO), considered India’s version of the US National Security Agency (NSA).
The Lab’s website says that its members have spoken at major international hacking and security conferences such as BlackHat, DEFCON, CanSecWest, POC and ISEC. They have made it into the DEFCON CTF finals and are the winners of a variety of hacking contests.
(With inputs from Yujin Jung)
(At The Quint, we question everything. Play an active role in shaping our journalism by becoming a member today.)