Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

Russian hackers reportedly targeted US nuclear sites after Ukraine invasion | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

A team of Russian hackers targeted three nuclear research labs in the US last summer, according to a Friday Reuters report.

The hacking team known as Cold Water, which is believed to be behind dozens of high-profile hacking incidents in recent years, targeted the Brookhaven (BNL), Argonne (ANL) and Lawrence Livermore National Laboratories (LLNL), according to internet records viewed by Reuters.

The news agency was unable to determine why those three labs were targeted, nor whether the hacking attempts had been successful. None of the labs or government offices involved responded to requests for comment on the story.

Cybersecurity experts told Reuters that Cold River has escalated its hacking attempts since Russia began its invasion of Ukraine last February.

The hacking attempt against US nuclear labs occurred between August and September 2022 as UN experts entered a Russian-controlled area of Ukraine to inspect the Zaporizhzhia nuclear power plant amid fears of a radiation disaster due to Russian shelling in the area.

Cold River hackers created fake login pages for the three nuclear research labs in a bid to get ahold of the passwords of employees at those facilities to gain access to their computer systems, the internet records revealed. The hackers often use email accounts and domain names that look similar to legitimate service providers, such as “” and “,” which appear to be the addresses of firms such as Google or Microsoft.

Illustrative: Russian President Vladimir Putin watches the Vostok 2022 (East 2022) military exercise in far eastern Russia, outside Vladivostok, September 6, 2022. (Mikhail Klimentyev, Sputnik, Kremlin Pool Photo via AP)

Cybersecurity experts told Reuters that Cold River had been responsible for targeting Britain’s Foreign Office in 2016 and also managed to get ahold of the emails belonging to the former head of Britain’s MI6 spy agency, leaking them to the public. Similar operations targeted government officials in Poland and Latvia, according to eastern European security officials.

In another recent espionage incident, Cold River created fake websites for three European NGOs investigating international war crimes just as a UN commission of inquiry released a report finding Russian forces responsible for human rights violations in Ukraine. Reuters did not specify whether the targeted NGOs were involved in the compiling of that commission’s report.

You’re a dedicated reader

We’re really pleased that you’ve read X Times of Israel articles in the past month.

That’s why we started the Times of Israel ten years ago – to provide discerning readers like you with must-read coverage of Israel and the Jewish world.

So now we have a request. Unlike other news outlets, we haven’t put up a paywall. But as the journalism we do is costly, we invite readers for whom The Times of Israel has become important to help support our work by joining The Times of Israel Community.

For as little as $6 a month you can help support our quality journalism while enjoying The Times of Israel AD-FREE, as well as accessing exclusive content available only to Times of Israel Community members.

Thank you,
David Horovitz, Founding Editor of The Times of Israel

Join Our Community

Join Our Community

Already a member? Sign in to stop seeing this

s.parentNode.insertBefore(t,s)}(window, document,’script’,
fbq(‘init’, ‘272776440645465’);
fbq(‘track’, ‘PageView’);

var comment_counter = 0;
window.fbAsyncInit = function() {
appId : ‘123142304440875’,
xfbml : true,
version : ‘v5.0’

FB.Event.subscribe(‘comment.create’, function (response) {
if(comment_counter == 2){
type: “POST”,
url: “/wp-content/themes/rgb/functions/facebook.php”,
data: { p: “2918963”, c: response.commentID, a: “add” }
comment_counter = 0;
FB.Event.subscribe(‘comment.remove’, function (response) {
type: “POST”,
url: “/wp-content/themes/rgb/functions/facebook.php”,
data: { p: “2918963”, c: response.commentID, a: “rem” }

(function(d, s, id){
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) {return;}
js = d.createElement(s); = id;
js.src = “”;
fjs.parentNode.insertBefore(js, fjs);
}(document, ‘script’, ‘facebook-jssdk’));


Click Here For The Original Story From This Source.

National Cyber Security