{
	"id": "fc36f9e2-75fc-470f-820b-81fca205a157",
	"created_at": "2026-04-06T00:18:09.456618Z",
	"updated_at": "2026-04-10T03:22:07.735054Z",
	"deleted_at": null,
	"sha1_hash": "fc0194110f5f5995aee67fc68a08bc06ceaeca9c",
	"title": "German Nuclear Power Plant Infected With Malware",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48150,
	"plain_text": "German Nuclear Power Plant Infected With Malware\r\nBy Dark Reading Staff\r\nPublished: 2016-04-28 · Archived: 2026-04-05 20:43:51 UTC\r\n1 Min Read\r\nA German nuclear power plant near Munich reportedly was found infected with malware. RWE, the German\r\nutility that runs the facility, has confirmed that since the plant is cut off from Internet, the malware infection did\r\nnot affect or harm operations, according to Reuters.\r\nConficker and W32.Ramnit malware were discovered in unit B of the Gundremmingen plant on the computer\r\nsystem that operates the tools that move nuclear fuel rods. Conficker is a worm that can spread quickly through\r\nnetworks, while W32.Ramnit steals files from computers and is spread through USB sticks, for instance.\r\nMikko Hypponen of F-Secure told Reuters it is not uncommon to find vital facilities infected with viruses, but\r\nthey are not harmful unless the infrastructure is the specific target.\r\nBSI, the country’s Federal Office for Information Security, has been notified of the incident and is looking into the\r\nmatter. Security measures have been increased after malware was also found in more than a dozen USB sticks in\r\nsome office computers not connected to the plant systems.\r\nFor the full story, see Reuters. \r\nAbout the Author\r\nhttps://www.darkreading.com/endpoint/german-nuclear-power-plant-infected-with-malware/d/d-id/1325298\r\nPage 1 of 2\n\nDark Reading\r\nDark Reading is a leading cybersecurity media site.\r\nSource: https://www.darkreading.com/endpoint/german-nuclear-power-plant-infected-with-malware/d/d-id/1325298\r\nhttps://www.darkreading.com/endpoint/german-nuclear-power-plant-infected-with-malware/d/d-id/1325298\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.darkreading.com/endpoint/german-nuclear-power-plant-infected-with-malware/d/d-id/1325298"
	],
	"report_names": [
		"1325298"
	],
	"threat_actors": [],
	"ts_created_at": 1775434689,
	"ts_updated_at": 1775791327,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fc0194110f5f5995aee67fc68a08bc06ceaeca9c.pdf",
		"text": "https://archive.orkl.eu/fc0194110f5f5995aee67fc68a08bc06ceaeca9c.txt",
		"img": "https://archive.orkl.eu/fc0194110f5f5995aee67fc68a08bc06ceaeca9c.jpg"
	}
}