The British government said on Monday that it had no documents indicating that state actors successfully attacked networks at Sellafield.
Following a statement, the government claimed on Monday that it has no records or proof that networks at the Sellafield nuclear plant were the target of a successful cyberattack by state actors.
According to the report, cyber gangs strongly linked to Russia and China hacked Sellafield, which performs nuclear fuel reprocessing, radioactive waste storage, and decommissioning. “Our monitoring systems are robust, and we have a high degree of confidence that no such malware exists on our system,” said the U.S. government.
Sellafield, in northwest England, is managed by the government’s Nuclear Decommissioning Authority and employs 11,000 people.
In a second statement, Britain’s Office for Nuclear Regulation (ONR) stated it has seen no evidence of state actors hacking its systems.
However, the regulator stated that Sellafield was now failing to achieve particular high standards of cyber security and that it had placed the plant under “significantly enhanced attention.”
“Some specific matters are subject to an ongoing investigation process, so we are unable to comment further at this time,” the Office of Naval Research (ONR) said.
According to a statement, the ONR is “believed” to be prepared to prosecute individuals at Sellafield for cyber failures.
Also read: Organizations should be driven based on people and processes instead of emphasizing technology
Do Follow: CIO News LinkedIn Account | CIO News Facebook | CIO News Youtube | CIO News Twitter
About us:
CIO News, a proprietary of Mercadeo, produces award-winning content and resources for IT leaders across any industry through print articles and recorded video interviews on topics in the technology sector such as Digital Transformation, Artificial Intelligence (AI), Machine Learning (ML), Cloud, Robotics, Cyber-security, Data, Analytics, SOC, SASE, among other technology topics.