Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
Zaki Khalid ذکی خالد 30 Oct 19
My latest commentary for sheds light on the details and implications of cyber intrusions into India's nuclear infrastructure.
Reply Retweet Like
Elliot Alderson 31 Oct 19
After denying the compromise of a nuclear power plant yesterday, change his mind and confirm it
Reply Retweet Like
Karishma Mehrotra 30 Oct 19
Source confirmed cyber audit of nuclear plant led by NCSC (National Cyber Security Council) found a breach of administrative system. The plant had denied hack on operations, which is seperate.
Reply Retweet Like
Florian Roth 30 Oct 19
Sigma rule to detect samples related to the incident (older ones mentioned in Kaspersky's report use process hollowing) Rule Sandbox
Reply Retweet Like
Kevin Perlow 29 Oct 19
Likely 3rd file re:: a1d103ae93c8b7cba0ea5b03d0bd2d9d (IN) - Compiled 05/19 - 10.2.114.9 from March file used as C2 - Bridges gap (browsers, cmds) between other two I've looked at Pic attached. Harder to connect other files, but *these* three seem related (1/2)
Reply Retweet Like
Dr Faruk Kazi 29 Oct 19
Good to know that is operating without any issue. However, over-reliance on in is dangerous. Breach of Air-gap in industrial control system & network is reported in many past incidences.
Reply Retweet Like
Viju Cherian 29 Oct 19
The 'cyber-incident' at has security implications and to address these serious security gaps the govt must first acknowledge the breach: Had an engaging conversation with on and Interview link soon.
Reply Retweet Like
Kevin Perlow 28 Oct 19
-Compiled 03/2019 -Less browser, no SMB, zips file list locally -Same IPs in strings, no apparent connectivity check -Zip pw: dkwero38oerA^t@# (Op Troy DPRK) Hard to know what the local IPs are (thus, if it's related) Hash via
Reply Retweet Like
S.D.Sharma 21 Nov 19
Can we hide this for long or put below carpet in digital world. India Confirms N-Plant Cyber Attack, But Mum On Attacker power plant attack Korea
Reply Retweet Like
PIB India 11 Jul 16
Replying to @PIB_India
2/n #2 is the 22nd reactor in the country
Reply Retweet Like
Andrea Fortuna 4 Nov 19
Reply Retweet Like
🅰️🦾⛏📎®️ Ego 9 Sep 12
Yes, freedom to peacefully protest but isn't this a security thread to a national asset?
Reply Retweet Like
Saikat Datta 12 Nov 19
Korea's top researcher Choi Sang-myeong told us that he has been able to identify the computer that was used as the launch pad for the against .
Reply Retweet Like
பூவுலகின் நண்பர்கள் 19 Dec 17
We welcome the stand taken by DMK demanding independent review of Units1&2Kudankulam.Also DMK MP’s in a memorandum submitted to the MOS in PMO Dr. Jitendra singh emphasised to halt further expansion of units 3&4 till the independent review is done.
Reply Retweet Like
Santhappanசாந்தப்பன் 9 Sep 12
Live Updates from Idinthakarai, Koodankulam KNPP east compound wall: More than...
Reply Retweet Like
Shouvik Das 30 Oct 19
A day after denying 's revelation of a cyber attack on the Nuclear Power Plant, NPCIL has now admitted to it. Prime suspect behind the attack is the malware that reported. For /.
Reply Retweet Like
Steve Miller 28 Oct 19
A Tale of Two PDBs 1) dropped CATRUNNER during intrusion C:\Users\user\Documents\Visual Studio 2010\Projects\payload_starter\Release\StartNC.pdb 2) dropped LEADLIFT (~DTRACK) at ? c:\Users\user\Documents\Visual Studio 2008\Projects\MyStub\Release\MyStub.pdb
Reply Retweet Like
Saikat Datta 12 Nov 19
Choi has also been working on uncoupling the that hit . He found Korean in the code. He believes the hackers are associated with Cell 101, that oversees all offensive ops. Also, had a Lazarus Group signature (Also NK)
Reply Retweet Like
Kevin Perlow 28 Oct 19
Attached pic is data collection from malware (a few other bits not pictured). - Local IP, MAC, OS install information (including registered org) via registry - Browser history - Connectivity to local IP - Compspec, ipconfig, netstat info via
Reply Retweet Like
d-atis☠️ 29 Oct 19
malware attacks are alarming but open source data published by the Nuclear Power Corporation Of highlight some reassuring safety measures incorporated at learning from the incidents of &
Reply Retweet Like