Advertisement

We need your help now

Support from readers like you keeps The Journal open.

You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.

If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.

2016 photo of a Greenpeace employee visiting the city of Prypyat that was abandoned after the catastrophe of Chernobyl in 1986 Andreas Stein/DPA/PA Images

Chernobyl's radiation monitoring system hit by cyberattack

The attacks began in Russia and Ukraine before spreading to western Europe and the US.

THE RADIATION MONITORING system at Ukraine’s Chernobyl nuclear site has been taken offline after a massive global cyberattack, forcing employees to use hand-held counters to measure levels, officials have said.

“Due to the cyberattack, the website of the Chernobyl nuclear plant is not working,” Ukraine’s exclusion zone agency, which oversees the Soviet plant that exploded in 1986 and is now surrounded by an uninhabited contaminated zone, said.

“Due to the temporary shutdown of the Windows system, the radiation monitoring of the industrial area is being done manually,” the agency said on its website.

“That means that our measurers go out with hand-held meters on the Chernobyl plant like it was decades ago,” a spokeswoman for the agency, Olena Kovalchuk, told AFP.

The plant’s destroyed reactor was enclosed in a huge metal structure last year in a bid to stop radiation leaks at the site, where more than 200 tonnes of uranium remains.

Ukraine’s exclusion zone agency said Chernobyl’s “technological systems are working as usual” and that radiation control is “without delays”.

Russia and US

The cyberattacks began in Russia and Ukraine, wreaking havoc on government and corporate computer systems before spreading to western Europe and across the Atlantic.

Several multinational companies said they were targeted, including US pharmaceutical giant Merck, Russian state oil giant Rosneft, British advertising giant WPP and the French industrial group Saint-Gobain.

The first reports of trouble came from Ukrainian banks, Kiev’s main airport and Rosneft, in a major incident reminiscent of the recent WannaCry virus.

Some IT experts identified the virus as Petrwrap, a modified version of the Petya ransomware that hit last year and demanded money from victims in exchange for the return of their data.

However, global cybersecurity firm Kaspersky Lab said: “Our preliminary findings suggest that it is not a variant of Petya ransomware as publicly reported, but a new ransomware that has not been seen before,” which it named ‘NotPetya’.

The cyberattack also recalled a ransomware outbreak last month that hit more than 150 countries and a total of more than 200,000 victims with the WannaCry ransomware.

‘Spreading round the world’

The virus is “spreading around the world, a large number of countries are affected,” Costin Raiu, a researcher at the Moscow-based Kaspersky Lab, said in a Twitter post.

In the United States, Merck was hit as was New York law firm of DLA Piper.

“It seems to be done by professionals criminals, and I think money is the motivation,” Sean Sullivan, a researcher at the Finnish cybersecurity group F-Secure, said.

He said that unlike the recent WannaCry attack, this attack has sophisticated elements that could make it easier to rapidly infect many more systems.

© AFP 2017

Read: Hospital in ‘no rush’ to turn off baby’s life support machine after parents lose appeal

Read: Trump congratulates Leo on leadership victory (after the US president was ‘on hold’ for 90 seconds)

Author
View 14 comments
Close
14 Comments
    Submit a report
    Please help us understand how this comment violates our community guidelines.
    Thank you for the feedback
    Your feedback has been sent to our team for review.
    JournalTv
    News in 60 seconds