{
	"id": "a1fd51de-ae4e-4aff-8cd6-1772106fc9f3",
	"created_at": "2026-04-06T00:13:26.639583Z",
	"updated_at": "2026-04-10T03:22:08.134762Z",
	"deleted_at": null,
	"sha1_hash": "f274d871fa29d205efc04c9d937aca5f20084d43",
	"title": "Malware found at a German nuclear power plant",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 34891,
	"plain_text": "Malware found at a German nuclear power plant\r\nBy Narinder Purba\r\nArchived: 2026-04-05 18:40:25 UTC\r\nMalware has been found on a computer at Gundremmingen nuclear power plant in Germany, it has been revealed.\r\nRWE states that it is not considered a threat as the infected computer is not connected to the internet.\r\n28 Apr 2016  •  , 1 min. read\r\nMalware has been found on a computer at Gundremmingen nuclear power plant in Germany, it has been revealed.\r\nReuters reported that RWE, the electric utilities company responsible for operating the plant, does not consider it a\r\nthreat as the infected computer is not connected to the internet.\r\nThe malware includes Conficker, which has been described as the most virulent malware of the 2000s.\r\nAt its peak, in 2009, it is thought to have infected over 15 million computers around the world.\r\nAccording to the news provider, malware was found on a computer that “was retrofitted in 2008 with data\r\nvisualization software associated with equipment for moving nuclear fuel rods”.\r\nHowever, this was not a sole incident, as malware was also discovered on 18 removeable disk drives.\r\nDavid Harley, a senior research fellow at ESET, said that given the number of infected removable drives also\r\nfound at the nuclear plant, \"internet disconnection doesn’t in itself guarantee that a system can’t be infected, can’t\r\nbe the cause of further infections on the site, or that a dangerous payload can’t be executed\".\r\n\"It’s possible in some circumstances for malware usually considered harmless to be literally dangerous if it finds\r\nits way onto a critical system,\" the expert concluded.\r\nIn an official press release, RWE said that the malware was found during “preparatory testing work”.\r\nResearch from earlier this year has suggested that countries around the world are underprepared when it comes to\r\ncyberattacks.\r\nThe third edition of the Nuclear Threat Initiative’s (NIT) Nuclear Security Index revealed that approximately half\r\nthe countries assessed do not have a single requirement in place to protect their nuclear facilities from this threat.\r\n“Like all critical infrastructure, nuclear facilities are not immune to cyberattacks,” the paper highlighted in\r\nJanuary.\r\n“That reality is particularly worrisome, however, given the potentially catastrophic consequences of a cyberattack\r\non a nuclear facility.”\r\nhttps://www.welivesecurity.com/2016/04/28/malware-found-german-nuclear-power-plant/\r\nPage 1 of 2\n\nLet us keep you\r\nup to date\r\nSign up for our newsletters\r\nSource: https://www.welivesecurity.com/2016/04/28/malware-found-german-nuclear-power-plant/\r\nhttps://www.welivesecurity.com/2016/04/28/malware-found-german-nuclear-power-plant/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.welivesecurity.com/2016/04/28/malware-found-german-nuclear-power-plant/"
	],
	"report_names": [
		"malware-found-german-nuclear-power-plant"
	],
	"threat_actors": [],
	"ts_created_at": 1775434406,
	"ts_updated_at": 1775791328,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f274d871fa29d205efc04c9d937aca5f20084d43.pdf",
		"text": "https://archive.orkl.eu/f274d871fa29d205efc04c9d937aca5f20084d43.txt",
		"img": "https://archive.orkl.eu/f274d871fa29d205efc04c9d937aca5f20084d43.jpg"
	}
}