Metacurity

Share this post

Russian Cold River Hacking Team Targeted Three U.S. Nuclear Research Labs

metacurity.substack.com

Russian Cold River Hacking Team Targeted Three U.S. Nuclear Research Labs

Cybercriminals use ChatGPT to build hacking tools, FCC proposes telecoms report breaches immediately, Biden's cyber strategy contemplates regulation, First catastrophic cyber bond emerges, more

Cynthia Brumfield
Jan 9
1
Share this post

Russian Cold River Hacking Team Targeted Three U.S. Nuclear Research Labs

metacurity.substack.com

Metacurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Aerial view of Lawrence Livermore National Laboratory llnl.gov, Public domain, via Wikimedia Commons

According to internal records and cybersecurity experts, between August and September of 2022, a Russian hacking team known as Cold River targeted three U.S. nuclear research laboratories Cold River targeted the Brookhaven (BNL), Argonne (ANL), and Lawrence Livermore National Laboratories (LLNL).

It’s unclear why the labs were targeted or if any attempted intrusion was successful, and the labs offered no comment. Cold River, which first appeared on the radar of intelligence professionals after targeting Britain's foreign office in 2016, has been involved in dozens of other high-profile hacking incidents in recent years, according to nine cybersecurity firms. (James Pearson and Chris Bing / Reuters)

Related: Databreaches.net, Nisos, The Guardian, Bloomberg Law…

Keep reading with a 7-day free trial

Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
Previous
Next
© 2023 DCT Associates
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing