{"id":31512,"date":"2019-10-30T15:36:43","date_gmt":"2019-10-30T15:36:43","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30630\/North-Korean-Malware-Found-On-Indian-Nuclear-Plants-Network.html"},"modified":"2019-10-30T15:36:43","modified_gmt":"2019-10-30T15:36:43","slug":"north-korean-malware-found-on-indian-nuclear-plants-network","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/","title":{"rendered":"North Korean Malware Found On Indian Nuclear Plant&#8217;s Network"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/10\/30\/425a11a8-980f-413b-b15b-73203091bbf6\/4b77dc33c202fa0116401faa104ba322\/the-kudankulam-nuclear-power-plant-kknpp.jpg\" class alt=\"the-kudankulam-nuclear-power-plant-kknpp.jpg\"><\/span><span class=\"credit\">Image via indiawaterportal.org<\/span><\/p>\n<p>The network of one of India&#8217;s nuclear power plants was infected with malware created by North Korea&#8217;s state-sponsored hackers, the Nuclear Power Corporation of India Ltd (NPCIL) confirmed today.<\/p>\n<p>News that the Kudankulam Nuclear Power Plant (KNPP) might have been infected with a dangerous strain of malware first surfaced on Twitter on Monday.<\/p>\n<p>Pukhraj Singh, a former security analyst for India&#8217;s National Technical Research Organization (NTRO), pointed out that a recent VirusTotal upload was actually linked to a malware infection at the KNPP.<\/p>\n<p>The particular malware sample included hardcoded credentials for KNPP&#8217;s internal network, suggesting the malware was specifically compiled to spread and operate inside the power plant&#8217;s IT network.<\/p>\n<h3>Malware linked to North Korea&#8217;s Lazarus Group<\/h3>\n<p>Several security researchers identified the malware <a href=\"https:\/\/twitter.com\/KevinPerlow\/status\/1188916377819713536\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">as a version of Dtrack<\/a>, a backdoor trojan developed by the Lazarus Group, North Korea&#8217;s elite hacking unit.<\/p>\n<p><a href=\"https:\/\/twitter.com\/RungRage\/status\/1188853620541775872\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Singh&#8217;s tweet<\/a> and revelation immediately went viral because just days before, the same power plant had an unexpected shutdown of one of its reactors &#8212; with many users conflating the two unrelated incidents as one.<\/p>\n<p>Initially, KNPP officials denied that they&#8217;ve suffered any malware infection, issuing a statement to describe the tweets as &#8220;false information,&#8221; and that a cyber-attack on the power plant was &#8220;not possible.&#8221;<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/confirmed-north-korean-malware-found-on-indian-nuclear-plants-network\/\" class=\"lazy\" alt=\"knpp-statement-1.png\" height=\"auto\" width=\"370\" data-original=\" https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2019\/10\/30\/db4f97f0-b98a-4be6-9e67-cec02cfafb13\/resize\/370xauto\/35ff561bfff848e17e63cf523e9dedcc\/knpp-statement-1.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2019\/10\/30\/db4f97f0-b98a-4be6-9e67-cec02cfafb13\/resize\/370xauto\/35ff561bfff848e17e63cf523e9dedcc\/knpp-statement-1.png\" class alt=\"knpp-statement-1.png\" height=\"auto\" width=\"370\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>But today, NPCIL, the KNPP&#8217;s parent company, admitted to the security breach <a href=\"https:\/\/www.scribd.com\/document\/432687853\/NPCIL-statement\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">in a separate statement<\/a>.<\/p>\n<p>&#8220;Identification of malware in NPCIL system is correct,&#8221; the statement started.<\/p>\n<p>NPCIL said the malware only infected its administrative network, but did not reach its critical internal network, the one used to control the power plant&#8217;s nuclear reactors. NPCIL said the two networks were isolated.<\/p>\n<p>In addition, NPCIL confirmed statements made by Singh on Twitter; that they received notification from CERT India back on September 4, when the malware was first spotted, and that they investigated the matter at the time of the report.<\/p>\n<h3>Not actually a big deal<\/h3>\n<p>According to <a href=\"https:\/\/securelist.com\/my-name-is-dtrack\/93338\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">an analysis of the Dtrack malware<\/a> from Russian antivirus maker Kaspersky, this trojan includes features for:<\/p>\n<ul>\n<li>keylogging,<\/li>\n<li>retrieving browser history,<\/li>\n<li>gathering host IP addresses, information about available networks and active connections,<\/li>\n<li>listing all running processes,<\/li>\n<li>listing all files on all available disk volumes.<\/li>\n<\/ul>\n<p>As evident from its features, Dtrack is usually used for reconnaissance purposes and as a dropper for other malware payloads.<\/p>\n<p>Previous Dtrack samples have been usually spotted in politically-motivated cyber-espionage operations, and in attacks on banks &#8212; with a custom version of Dtrack, named AMTDtrack also being discovered last month.<\/p>\n<p>Historically, the Lazarus Group or any other North Korean hacker group, have rarely gone after <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/operation-sharpshooter-targets-global-defense-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">targets in the energy and industrial sector<\/a>. When they did, they went after proprietary intellectual property, rather than sabotage.<\/p>\n<p>Most of North Korea&#8217;s offensive hacking efforts have been focused on attaining insight into diplomatic relations, tracking former North Korean citizens who fled the country, or hacking banks and cryptocurrency exchanges to gather funds for the Pyongyang regime <a href=\"https:\/\/www.zdnet.com\/article\/us-treasury-sanctions-three-north-korean-hacking-groups\/\" target=\"_blank\" rel=\"noopener noreferrer\">to raise funds for its weapons and missile programs<\/a>.<\/p>\n<p>The KNPP incident looks more like an accidental infection, rather than a well-planned operation. This specifically seems to be the case, since Kaspersky reported last month that the Lazarus Group had been <a href=\"https:\/\/www.zdnet.com\/article\/new-north-korean-malware-targeting-atms-spotted-in-india\/\" target=\"_blank\" rel=\"noopener noreferrer\">spotted spreading Dtrack and AMDtrack versions across India<\/a>, targeting its financial sector.<\/p>\n<p><em>Article updated shortly after publication to include link to McAfee research on previous North Korean campaigns targeting the energy and industrial sector.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30630\/North-Korean-Malware-Found-On-Indian-Nuclear-Plants-Network.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":31513,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8235],"class_list":["post-31512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentindiacyberwarkoreascada"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>North Korean Malware Found On Indian Nuclear Plant&#039;s Network 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korean Malware Found On Indian Nuclear Plant&#039;s Network 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-30T15:36:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"490\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"North Korean Malware Found On Indian Nuclear Plant&#8217;s Network\",\"datePublished\":\"2019-10-30T15:36:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/\"},\"wordCount\":584,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg\",\"keywords\":[\"headline,hacker,government,india,cyberwar,korea,scada\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/\",\"name\":\"North Korean Malware Found On Indian Nuclear Plant's Network 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg\",\"datePublished\":\"2019-10-30T15:36:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg\",\"width\":1000,\"height\":490},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korean-malware-found-on-indian-nuclear-plants-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,india,cyberwar,korea,scada\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentindiacyberwarkoreascada\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"North Korean Malware Found On Indian Nuclear Plant&#8217;s Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korean Malware Found On Indian Nuclear Plant's Network 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/","og_locale":"en_US","og_type":"article","og_title":"North Korean Malware Found On Indian Nuclear Plant's Network 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-30T15:36:43+00:00","og_image":[{"width":1000,"height":490,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"North Korean Malware Found On Indian Nuclear Plant&#8217;s Network","datePublished":"2019-10-30T15:36:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/"},"wordCount":584,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg","keywords":["headline,hacker,government,india,cyberwar,korea,scada"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/","url":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/","name":"North Korean Malware Found On Indian Nuclear Plant's Network 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg","datePublished":"2019-10-30T15:36:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/north-korean-malware-found-on-indian-nuclear-plants-network.jpg","width":1000,"height":490},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/north-korean-malware-found-on-indian-nuclear-plants-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,india,cyberwar,korea,scada","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentindiacyberwarkoreascada\/"},{"@type":"ListItem","position":3,"name":"North Korean Malware Found On Indian Nuclear Plant&#8217;s Network"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=31512"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31512\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/31513"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=31512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=31512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=31512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}