Iran has informed the International Atomic Energy Agency it will resume testing of a new generation of nuclear centrifuges Wednesday.
Ali Akbar Salehi, the head of Iran’s nuclear energy agency, said Tehran would remain within the framework of the Joint Comprehensive Plan of Action, or JCPOA, nuclear deal reached with the five permanent members of the United Nations plus Germany. Salehi added that the accord allowed Iran to test a new generation of nuclear centrifuges and that his country’s nuclear program is intended for peaceful civilian purposes.
Salehi says Supreme Leader Ayatollah Ali Khamenei issued a religious edict years ago that banned nuclear weapons.
Khamenei told a group of visitors Monday that he had issued orders for the country’s Atomic Energy Organization to increase its enrichment capacity to 190,000 centrifuges, provisionally, in accordance with the JCPOA.
President Donald Trump withdrew the United States from the 2015 nuclear accord last month. Britain, France and Germany have been attempting to salvage the deal that Trump has described as “horrible” and “one-sided.”
Former Iranian President Abolhassan Bani Sadr told VOA he thinks Khamenei’s decision to resume nuclear enrichment capacity is “not a well-thought out move,” and that it is having negative consequences on regional interests.
According to Bani Sadr, the decision strengthens Israeli Prime Minister Benjamin Netanyahu’s charge that Iran represents a threat to Israel and must evacuate its forces from Syria, as requested by the U.S.-Israeli-Saudi axis.
In addition, said Bani Sadr, Khamenei’s statement that Israel will be “eradicated from the face of the Earth” negatively influences public opinion against Tehran.
Khattar Abou Diab, a political science professor at the University of Paris, tells VOA that Khamenei’s decision was aimed at pressuring Europe into gaining concessions from the United States. While France’s foreign minister spoke of “red lines” that Iran must not cross, Paris, Berlin and London have asked to be exempted from new economic sanctions Trump imposed on Iran.
After first denying any malware attack, the Nuclear Power Corporation of India (NPCIL) on Wednesday confirmed the presence of malware in its system at the Kudankulam nuclear plant, which has been traced to North Korea’s Dtrack.
In a press statement, the NPCIL said “identification of malware in NPCIL system was correct” but added that the “infected PC” belonged to a user “who was connected in the internet connected network used for administrative purposes”.
It said the infected PC “has been isolated from the critical internal network” and that the “networks are being continuously monitored”.
It added: “Investigation also confirms that the plant systems are not affected”.
Earlier, in the statement, it said that the matter was conveyed by CERT-in (Indian Computer Emergency Response Team, an office within the Ministry of Electronics and Information Technology) when they noticed it on September 4.
“The matter was immediately investigated by DAE (Department of Atomic Energy) specialists,” the statement said.
The NPCIL is a body under the DAE, which in turn comes under the purview of the prime minister’s office.
According to Zednet, Pukhraj Singh, a former security analyst for India’s National Technical Research Organization (NTRO), pointed out that a recent VirusTotal upload was actually linked to a malware infection at the Kudankulam Nuclear Power Plant.
The particular malware sample included hardcoded credentials for KNPP’s internal network, suggesting the malware was specifically compiled to spread and operate inside the power plant’s IT network.
Several security researchers identified the malware as a version of Dtrack, a backdoor trojan developed by the Lazarus Group, North Korea’s elite hacking unit.
Singh’s tweet and revelation immediately went viral because just days before, the same power plant had an unexpected shutdown of one of its reactors — with many users conflating the two unrelated incidents as one.
In a press statement on Tuesday, the NPCIL had denied any malware attack.
It said that “false information was being circulated” on the social media platform, electronic and print media on a malware attack on the Kudankulam plant.
It said that KNPP and other Indian Nuclear Power Plants Control Systems are “stand alone and not connected to outside cyber network and internet”.
“Any cyber attack on the Nuclear Power Plant Control System is not possible”, it said, and added that Kudanklam Unit 1 and 2 “are operating without any operational or safety concerns”.
Arstechnica.com, quoting Kaspersky Lab said, said in a recent article on Dtrack: “North Korea’s hermit government has developed a new strain of malware that steals data used at automatic teller machines in India”.
“One piece of malware, dubbed ATMDtrack by researchers with the Moscow-based security firm, has been targeting Indian ATMs since last summer. It allows its operators to read and store data associated with cards that are inserted into infected ATMs. As researchers with the Moscow-based security firm investigated further, they found that the ATM malware was part of a larger remote-access trojan that carries out traditional espionage activities. Dubbed “Dtrack”, it was used as recently as this month to target financial institutions and research centers.”
Congress leader Shashi Tharoor tweeted: “With NPCIL confirming the cyber attack on Kudankulam, the National Cyber Security Coordinator (NCSC) and NSA must address public concerns about this dangerous intrusion.”
He said that at the Combined Commanders Conference in 2014, @PMOIndia called for the creation of a Digital Armed Force. “Five years later, there is no sign of it. Is this yet another jumla? On national security, can we afford hollow promises?”
He said the “National Critical Information Infrastructure Protection Centre is under the ‘administrative control’ of the NTRO. Under this government, why has India’s premier technical intelligence agency not been offered the resources to fight back against such attacks?”
“The North Korea-based Lazarus Group has been purportedly linked to the cyber attack. Do such mercenary groups act alone, or are they hired by bigger and more powerful states, to target India’s strategic installations?” he asked. (IANS)