{"id":15623,"date":"2019-06-25T20:47:11","date_gmt":"2019-06-26T04:47:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/06\/25\/news-9372\/"},"modified":"2019-06-25T20:47:11","modified_gmt":"2019-06-26T04:47:11","slug":"news-9372","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/06\/25\/news-9372\/","title":{"rendered":"Chernobyl\u2019s lessons for critical-infrastructure cybersecurity"},"content":{"rendered":"<p><strong>Credit to Author: Seth Rosenblatt| Date: Fri, 21 Jun 2019 15:30:00 +0000<\/strong><\/p>\n<p><em>This story originally ran on <\/em><a rel=\"noreferrer noopener\" aria-label=\"The Parallax (opens in a new tab)\" href=\"https:\/\/the-parallax.com\/2019\/04\/26\/cybersecurity-lessons-chernobyl\/\" target=\"_blank\"><em>The Parallax<\/em><\/a><em> on April 26, 2019.<\/em><\/p>\n<p>CHERNOBYL EXCLUSION ZONE, Ukraine\u2014The stray dog looking directly at me was hard to resist. Her ears perked up, her fur appeared clean\u2014free of mange, at any rate\u2014and she held a large stick firmly between her jaws.<\/p>\n<p>She looked like a good dog. She wanted to be petted or, at least, have someone wrestle the stick from her\u2014perhaps throw it so she could retrieve it. But because we met near Cafe Desyatka, in the woods of the Chernobyl Exclusion Zone, a 1,004-square-mile region slightly smaller than Yosemite National Park that surrounds the Chernobyl Nuclear Power Plant, looking but not touching was probably the safer choice. I was less worried about how irradiated she might be than about whether she had rabies.<\/p>\n<p>According to a 2017 estimate by the United States\u2013based nonprofit <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/cleanfutures.org\/\" target=\"_blank\">Clean Futures Fund<\/a>, this dog was one of hundreds of strays living in the Exclusion Zone, near the power plant, and in the abandoned cities of Chernobyl and Pripyat, which once housed the nuclear facility\u2019s employees. The organization offers aid to communities decimated by industrial accidents, and that includes\u00a0<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/cleanfutures.org\/projects\/dogs-of-chernobyl\/\" target=\"_blank\">caring for the Chernobyl dogs<\/a>, many of whom die young due to malnourishment, disease, predators, harsh weather, a lack of shelter, and Chernobyl\u2019s notorious environmental contamination.<\/p>\n<ul class=\"wp-block-gallery columns-3 is-cropped\">\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39178\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-abandoned-plow-01\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-abandoned-plow-01.jpg\" data-orig-size=\"4914,3267\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;4&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539049185&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;44&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-abandoned-plow-01\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-abandoned-plow-01-300x199.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-abandoned-plow-01-600x399.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-abandoned-plow-01-600x399.jpg\" alt=\"\" data-id=\"39178\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39178\" class=\"wp-image-39178\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-abandoned-plow-01-600x399.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-abandoned-plow-01-300x199.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39183\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-pripyat-04\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-04.jpg\" data-orig-size=\"5616,3537\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;5.6&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539058578&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;30&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.00555555555556&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-Pripyat-04\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-04-300x189.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-04-600x378.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-04-600x378.jpg\" alt=\"\" data-id=\"39183\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39183\" class=\"wp-image-39183\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-04-600x378.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-04-300x189.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39175\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-reactor-02\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-reactor-02.jpg\" data-orig-size=\"4358,3429\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;6.7&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539057757&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;30&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.00555555555556&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-reactor-02\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-reactor-02-300x236.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-reactor-02-600x472.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-reactor-02-600x472.jpg\" alt=\"\" data-id=\"39175\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39175\" class=\"wp-image-39175\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-reactor-02-600x472.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-reactor-02-300x236.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39180\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-pripyat-01\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-01.jpg\" data-orig-size=\"5580,3744\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539061194&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.004&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-Pripyat-01\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-01-300x201.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-01-600x403.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-01-600x403.jpg\" alt=\"\" data-id=\"39180\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39180\" class=\"wp-image-39180\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-01-600x403.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-01-300x201.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39182\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-pripyat-03\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-03.jpg\" data-orig-size=\"5616,3744\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;3.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539062749&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;24&quot;,&quot;iso&quot;:&quot;400&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-Pripyat-03\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-03-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-03-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-03-600x400.jpg\" alt=\"\" data-id=\"39182\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39182\" class=\"wp-image-39182\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-03-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-03-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39191\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-duga-array-03-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-03-1.jpg\" data-orig-size=\"5616,3744\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;5.6&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539053123&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;24&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-Duga-array-03\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-03-1-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-03-1-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-03-1-600x400.jpg\" alt=\"\" data-id=\"39191\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39191\" class=\"wp-image-39191\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-03-1-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-03-1-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39192\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-soldier-memorial-01\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-soldier-memorial-01.jpg\" data-orig-size=\"5615,3465\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;3.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539054722&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;24&quot;,&quot;iso&quot;:&quot;400&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-soldier-memorial-01\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-soldier-memorial-01-300x185.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-soldier-memorial-01-600x370.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-soldier-memorial-01-600x370.jpg\" alt=\"\" data-id=\"39192\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39192\" class=\"wp-image-39192\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-soldier-memorial-01-600x370.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-soldier-memorial-01-300x185.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"39193\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-railroad-01\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-railroad-01.jpg\" data-orig-size=\"5131,3548\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;5.6&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539058656&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;70&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.00555555555556&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-railroad-01\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-railroad-01-300x207.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-railroad-01-600x415.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-railroad-01-600x415.jpg\" alt=\"\" data-id=\"39193\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=39193\" class=\"wp-image-39193\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-railroad-01-600x415.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-railroad-01-300x207.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/li>\n<\/ul>\n<p>Soviet soldiers forced the owners of the dogs\u2019 ancestors to abandon them in the evacuation that followed the Chernobyl disaster, which began 33 years ago today. Chernobyl, the first nuclear-power plant in the Soviet Union, had been operational for nine years. At 1:23 a.m. on April 26, 1986, a series of facility tests initiated the prior day culminated in the fuel chamber getting overpressurized.<\/p>\n<p>During the tests, which were designed to determine how long the turbines would spin after a loss of electricity, an operator decided to carry on with testing procedures amid signs that&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/www.rri.kyoto-u.ac.jp\/NSRG\/reports\/kr79\/kr79pdf\/Malko1.pdf\" target=\"_blank\">the reactor was malfunctioning<\/a>. Two explosions, driven by super-heated steam, followed. And smoke from fires spread radioactive material\u2014400 times the amount released at Hiroshima\u2014far beyond Chernobyl.<\/p>\n<p>Two Chernobyl workers were immediately killed by explosions. Three more died the following week, and by the end of July, radiation exposure had killed 28 people, including six firefighters, according to the&nbsp;<a href=\"http:\/\/www.world-nuclear.org\/information-library\/safety-and-security\/safety-of-plants\/chernobyl-accident.aspx\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">World Nuclear Association\u2019s assessment of the Chernobyl disaster<\/a>, last updated in April 2018. At least 106 others received doses of radiation high enough to contract acute radiation sickness.<\/p>\n<p>This was not the first disaster at Chernobyl: A partial meltdown of Chernobyl Reactor 1\u2019s core occurred in 1982, but the event and its impact were&nbsp;<a href=\"http:\/\/www.rri.kyoto-u.ac.jp\/NSRG\/reports\/kr139\/pdf\/tykhyy-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">concealed from the public<\/a>.<\/p>\n<p>The official Soviet response was to blame the disaster on facility workers who bungled the tests. This conclusion was&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/www-pub.iaea.org\/MTCD\/publications\/PDF\/Pub913e_web.pdf\" target=\"_blank\">supported by the International Atomic Energy Association<\/a>&nbsp;in 1992. But Chernobyl\u2019s deputy chief engineer, Anatoly Stepanovich Dyatlov,&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.washingtonpost.com\/archive\/politics\/1992\/04\/27\/chernobyls-shameless-lies\/96230408-084a-48dd-9236-e3e61cbe41da\/?noredirect=on&amp;utm_term=.1a00c81f3ef5\" target=\"_blank\">alleged in a 1992 interview<\/a>&nbsp;that flaws in the reactor design were the root cause.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39185\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-stray-dog-01-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-stray-dog-01-1.jpg\" data-orig-size=\"4897,3115\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;4&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539052760&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;44&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-stray-dog-01\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-stray-dog-01-1-300x191.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-stray-dog-01-1-600x382.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-stray-dog-01-1-600x382.jpg\" alt=\"\" class=\"wp-image-39185\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-stray-dog-01-1-600x382.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-stray-dog-01-1-300x191.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>One of the hundreds of stray dogs living in the Chernobyl Exclusion Zone, descendants of the original pets which Soviet soldiers forced Chernobyl residents to abandon in the aftermath of the disaster.&nbsp;Photo by Seth Rosenblatt\/The Parallax<\/figcaption><\/figure>\n<\/div>\n<p>Dyatlov\u2019s judgment is supported by a 2002 report for the&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.semanticscholar.org\/paper\/The-Chernobyl-Reactor-%3A-Design-Features-and-Reasons-Malko\/025a70432d683db2981f012c8f1e5d50d85f2865\" target=\"_blank\">National Academy of Sciences of Belarus<\/a>, which investigated the reactor design and how it led to the disaster. It is also supported by a 2009&nbsp;<a href=\"http:\/\/www.world-nuclear.org\/information-library\/safety-and-security\/safety-of-plants\/appendices\/chernobyl-accident-appendix-1-sequence-of-events.aspx\">analysis by the World Nuclear Association<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cThe accident at Chernobyl was the product of a lack of safety culture. The reactor design was poor, from the point of view of safety, and unforgiving for the operators, both of which provoked a dangerous operating state. The operators were not informed of this and were not aware that the test performed could have brought the reactor into an explosive condition. In addition, they did not comply with operational procedures. The combination of these factors provoked a nuclear accident of maximum severity in which the reactor was totally destroyed within a few seconds.\u201d<\/p>\n<\/blockquote>\n<p>Multiple human factors led to the disaster at Chernobyl, from the Soviet decision to use the flawed reactor system when building the facility in the 1970s to the operators\u2019 actions that fateful hour in 1986. And experts believe that human errors, including a reliance on overly connected or outdated systems to&nbsp;<a href=\"https:\/\/the-parallax.com\/2018\/05\/16\/critical-infrastructure-unprepared\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">monitor and run critical infrastructure<\/a>, could be exploited to pose similar threats to today\u2019s nuclear-power facilities.<\/p>\n<p>It remains an open question whether the industry\u2019s collective responses are enough to stave off even the most clever of&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/the-parallax.com\/2018\/08\/24\/nsa-defcon-cybersecurity-team-sport\/\" target=\"_blank\">nation-state cyberattacks<\/a>. What\u2019s clear is that cyberattacks against all critical-infrastructure operations are on the rise, and nuclear-power facilities are not exempt,&nbsp;according to a&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/media.nti.org\/documents\/NTI_CyberThreats__FINAL.pdf\" target=\"_blank\">2016 report<\/a>&nbsp;by the nuclear-security nonprofit&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.nti.org\/\" target=\"_blank\">Nuclear Threat Initiative<\/a>.<\/p>\n<p>Heavy regulations in the nuclear-power industry extending to cybersecurity protocol make nuclear-power facilities more secure than <a href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2019\/04\/when-malware-becomes-a-threat-to-physical-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"other types of power facilities (opens in a new tab)\">other types of power facilities<\/a>, cybersecurity experts say. The regulations, in part, stem from education about Chernobyl. But cyberattacks against US nuclear-power facilities in the 2000s helped push regulators to take a more active role.<\/p>\n<h3>Early lessons from the school of cyber-knocks<\/h3>\n<p>In 2003, the&nbsp;<a href=\"https:\/\/the-parallax.com\/2017\/05\/22\/parallax-primer-malware-worms\/\">computer worm<\/a>&nbsp;SQL Slammer tackled more than 75,000 computers around the globe in 10 minutes, including those at the Davis-Besse nuclear-power plant in Ohio.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/SQL_Slammer\">Slammer<\/a>&nbsp;prevented employees from accessing the software needed to monitor system safety for about five hours.<\/p>\n<p>Thanks to a computer backup system, combined with the reactor being offline for unrelated reasons, the Slammer attack didn\u2019t result in any damage. Instead, says Michael Toecker, the founder of cybersecurity consultancy Context Industrial Security, \u201cthe industry took it as a wake-up call\u2026Everybody in nuclear turned their heads and said, \u2018What just happened?\u2019\u201d<\/p>\n<p>There were\u00a0<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/fhr.nuc.berkeley.edu\/wp-content\/uploads\/2017\/09\/TH-Report-UCBTH-17-004.pdf\" target=\"_blank\">at least two other<\/a> cybersecurity incidents at US nuclear-power plants that decade\u2014in 2006, at the Browns Ferry Nuclear Power Plant in Alabama, and in 2008, at the Hatch Nuclear Power Plant in Georgia\u2014before the <a href=\"https:\/\/www.nrc.gov\/reading-rm\/doc-collections\/cfr\/part073\/part073-0054.html\">US Nuclear Regulatory Commission mandated<\/a>\u00a0that all nuclear-power facilities have\u00a0<a href=\"https:\/\/adamswebsearch2.nrc.gov\/webSearch2\/main.jsp?AccessionNumber=ML16341B257\">a cybersecurity plan<\/a>\u00a0in 2009.<\/p>\n<p>A year later, the NRC introduced the&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.nrc.gov\/docs\/ML0903\/ML090340159.pdf\" target=\"_blank\">Regulatory Guide 5.71<\/a>, a series of \u201cbest practices\u201d it developed with input from the&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.dhs.gov\/\" target=\"_blank\">Department of Homeland Security<\/a>, the&nbsp;<a href=\"https:\/\/www.ieee.org\/\">Institute of Electrical and Electronics Engineers<\/a>, the&nbsp;<a href=\"https:\/\/www.isa.org\/\">International Society of Automation<\/a>, the&nbsp;<a href=\"https:\/\/www.nist.gov\/\">National Institute of Standards and Technology<\/a>, and the&nbsp;<a href=\"https:\/\/nei.org\/\">Nuclear Energy Institute<\/a>. Each plant\u2019s plan must hit eight milestones, which include creating a cybersecurity assessment team; identifying different cybersecurity levels and figuring out which devices need to be on each level; and protecting devices from portable media like thumb drives.<\/p>\n<p>Threats such as Slammer \u201care probably equivalent\u201d in scope to those at non-nuclear facilities, says F. Mitch McCrory, an internationally recognized cybersecurity expert who currently manages the Risk and Reliability Analysis Department in Sandia National Laboratories\u2019 Energy, Earth, and Complex Systems Center. All power plants must be concerned with cyberattacks such as insider threats, software and hardware&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/the-parallax.com\/2017\/09\/29\/ccleaner-security-software-supply-chain\/\" target=\"_blank\">supply chain attacks<\/a>, and hackers remotely accessing the network. But considering a disaster like Chernobyl, he says, nuclear-facility operators must \u201cdo cybersecurity better than other places.\u201d<\/p>\n<h3>Layered security to stop hackers<\/h3>\n<p>In his\u00a0<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.amazon.com\/Nuclear-Energy-Option-Alternative-90s\/dp\/0306435675\" target=\"_blank\">1990 book on nuclear energy<\/a>, Bernard Leonard Cohen, a professor emeritus of physics at the University of Pittsburgh, wrote that \u201cpost-accident analyses indicate that if there had been a US-style containment in the Chernobyl plant, none of the radioactivity would have escaped, and there would have been no injuries or deaths.\u201d<\/p>\n<p>That was before critical-infrastructure hacks became common. Stricter regulations on US nuclear-power facilities implemented since then include a requirement that the networks connecting nuclear-power machinery be separate from the business side of the facility. Nuclear facilities are also required to use one-way data diodes to control the flow of information from monitoring devices to central computers controlling the plant.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39188\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-pripyat-02-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-02-1.jpg\" data-orig-size=\"5616,3744\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;3.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539060208&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-Pripyat-02\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-02-1-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-02-1-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-02-1-600x400.jpg\" alt=\"\" class=\"wp-image-39188\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-02-1-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Pripyat-02-1-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Bumper cars that were part of the amusement park in the now-abandoned town of Pripyat, Ukraine, home to more than 49,000 people when it was fully evacuated following the disaster.&nbsp;Photo by Seth Rosenblatt\/The Parallax<\/figcaption><\/figure>\n<\/div>\n<p>\u201cDigital instrumentation diodes prevent communication from the business network into the control system network. It mostly removes the threat vector of trying to hack into the system through the business network,\u201d McCrory says, because there\u2019s no way to send data back to its source\u2014which is possible over traditionally used copper wiring. \u201cAnd control system networks have digital-asset monitoring, to scan all devices for malware.\u201d<\/p>\n<p>There are procedural protections in place as well, Toecker says. Hardware and software updates must be tested on remote systems. Any software code written by a nuclear engineer for a nuclear facility must be reviewed by other engineers who have no relationship to the author. Software from an outside vendor must go through a source verification process, which can involve a hash check or software signature check, depending on the kind of software. Update installations must be documented. And depending on the type of update or the status of the facility, other precautionary procedures might come into play.<\/p>\n<p>\u201cWe started doing  in 2012,\u201d Toecker says. \u201cThe rest of the power industry is only getting to that now.\u201d<\/p>\n<h3>Cybersecurity holes still remain<\/h3>\n<p>Even after taking every imaginable precaution, no computerized system is ever hack-proof, and there is still plenty for the nuclear-power industry to improve on, says Bryan Owen, cybersecurity manager at enterprise data management software maker OSIsoft, whose software is used by nuclear facilities across the world to manage streams of monitoring data.<\/p>\n<p>Top on his list is exporting US standards to other countries, not all of which have such strict regulations in place. In the United States, \u201cregulators, standards organizations, government departments, customers, partners\u2014they all rolled up their sleeves for years to develop the nuclear-cybersecurity regulations,\u201d he says. \u201cOSIsoft has almost 50 percent market share globally, and I\u2019ve visited facilities all over the world. But I haven\u2019t seen this replicated.\u201d<\/p>\n<p>Owen would also like available data on \u201cnear-misses,\u201d when something goes wrong but doesn\u2019t result in a significantly notable event. \u201cThis has proven to be a constructive approach in aviation safety,\u201d he says, but remains \u201celusive\u201d for critical infrastructure.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39190\" data-permalink=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/attachment\/20181009-chernobyl-duga-array-01-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-01-1.jpg\" data-orig-size=\"5067,3378\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;4.5&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539053514&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;70&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.008&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20181009-Chernobyl-Duga-array-01\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-01-1-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-01-1-600x400.jpg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-01-1-600x400.jpg\" alt=\"\" class=\"wp-image-39190\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-01-1-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-Duga-array-01-1-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>A hidden Soviet Duga array, an over-the-horizon radar system for detecting missile attacks, was revealed to the public in the aftermath of the Chernobyl nuclear disaster.&nbsp;Photo by Seth Rosenblatt\/The Parallax<\/figcaption><\/figure>\n<\/div>\n<p>Nuclear-power facilities across the world also must contend with issues related to aging: Equipment can easily last \u201c12 to 15 years,\u201d Toecker says, but&nbsp;<a href=\"https:\/\/the-parallax.com\/2018\/04\/24\/critical-systems-patch-bsidessf\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">older equipment connected to networks can be harder to protect<\/a>, as vendors discontinue product lines or go out of business.<\/p>\n<p>In his 2016 report on&nbsp;<a href=\"https:\/\/www.controlglobal.com\/assets\/wp_downloads\/pdf\/CT-1611-Bela-Liptak-on-Safety-Cyber-security-and-nuclear-power.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">cybersecurity and nuclear-power facilities<\/a>, engineering and automation specialist B\u00e9la Lipt\u00e1k lays out the challenges in getting facility operators to protect customers.<\/p>\n<p>\u201cWe also know that for financial reasons, and because of management convenience, the whole nuclear industry is drifting toward installing completely digital controls to allow the remote operation of some plant functions,\u201d he writes. To protect consumers from hackers disrupting plant operations, he says the NRC must mandate \u201ctotally separating the corporate business networks from the plant networks, and to realize that digital firewalls do not guarantee this separation.\u201d<\/p>\n<p>That last bit of guidance is not clearly stated in US regulations of nuclear-power plants. And although data diodes may isolate the sensors that measure the plant\u2019s functions from the plant\u2019s operations network, industrial control system cybersecurity expert <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.controlglobal.com\/blogs\/unfettered\/\" target=\"_blank\">Joe Weiss<\/a>\u00a0says regulations should specify that sensors have on-board cybersecurity protections to stop\u00a0<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/geer.tinho.net\/ieee\/ieee.sp.geer.1801.pdf\" target=\"_blank\">data manipulation<\/a>\u00a0at the source. In most cases, he says, they don\u2019t.<\/p>\n<p>\u201cIf you can\u2019t trust what you measure, you\u2019re in pretty sad shape,\u201d Weiss says. \u201cIf the sensor has&nbsp;remote communication capability, whether wired or wireless,&nbsp;<a href=\"https:\/\/the-parallax.com\/2016\/09\/12\/can-vote-hacked-after-cast\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">it can be vulnerable<\/a>. We made our systems accessible without truly understanding what that meant.\u201d<\/p>\n<p>Sensor vulnerability strikes at the core of Weiss\u2019 concerns about nuclear power plant safety, especially as&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.wired.com\/2009\/05\/threemile\/\" target=\"_blank\">overwhelmed sensors made the Three Mile Island incident<\/a>&nbsp;in 1979 much harder to stop.<\/p>\n<p>\u201cIf what you\u2019re measuring is not correct, your actions based on that are not going to be correct. If you\u2019re a doctor, and you can\u2019t trust your temperature or blood pressure reading, how can you make a good diagnosis?\u201d he asks. \u201cWhen you talk about&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/the-parallax.com\/2018\/09\/07\/karamba-quest-secure-cars\/\" target=\"_blank\">sensors, that\u2019s the heart of safety<\/a>.\u201d<\/p>\n<h3>High cost of failure<\/h3>\n<p>The Chernobyl plant, today covered in a 350-foot-high, 840-foot-wide&nbsp;<a href=\"http:\/\/www.bbc.com\/future\/story\/20170101-a-new-tomb-for-the-most-dangerous-disaster-site-in-the-world\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">metal-and-concrete sarcophagus<\/a>, stands as a sober monument to the importance of prioritizing community security and safety.<\/p>\n<p>For all of the damage the Chernobyl disaster wrought, it is rife with warning signs that anybody can go see for themselves of what can happen when politics or profits trumps safety protocol: the abandoned buildings of the former Chernobyl employee village of Pripyat; the exposure of a once-hidden\u00a0<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.cnn.com\/travel\/article\/duga-radar-chernobyl-ukraine\/index.html\" target=\"_blank\">missile-detecting radar array<\/a> (view our photos of the Duga array above); and hundreds of sadly untouchable stray dogs.<\/p>\n<p>In the years that followed the Chernobyl disaster, the&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.nrc.gov\/reading-rm\/doc-collections\/fact-sheets\/chernobyl-bg.html\" target=\"_blank\">NRC decided<\/a>&nbsp;over a series of at least three reports that there were few safety improvements, if any, for the United States to make at its reactors. After participating in a select scientific panel analyzing what happened, the Nobel laureate and American physicist Hans Bethe told Richard Rhodes for&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.pbs.org\/wgbh\/pages\/frontline\/shows\/reaction\/readings\/chernobyl.html\" target=\"_blank\">his book on Chernobyl<\/a>, \u201cthe Chernobyl disaster tells us about the deficiencies of the Soviet political and administrative system rather than about problems with nuclear power.\u201d<\/p>\n<p>Weiss remains concerned about the security of nuclear plants in the United States and abroad because the stakes are so high.<\/p>\n<p>\u201cThis isn\u2019t a data breach,\u201d he argues. \u201cThis is blowing things up.\u201d<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/\">Chernobyl\u2019s lessons for critical-infrastructure cybersecurity<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Seth Rosenblatt| Date: Fri, 21 Jun 2019 15:30:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/' title='Chernobyl\u2019s lessons for critical-infrastructure cybersecurity'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/20181009-Chernobyl-reactor-01.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The Parallax&#8217;s Seth Rosenblatt shares his story on the root cause of the Chernobyl disaster and the lessons organizations\u2014especially those in nuclear power\u2014can take away to secure critical infrastructure against a rising tide of cyberattacks.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/vital-infrastructure\/\" rel=\"category tag\">Vital infrastructure<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chernobyl\/\" rel=\"tag\">chernobyl<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/chernobyl-disaster\/\" rel=\"tag\">chernobyl disaster<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/chernobyl-dogs\/\" rel=\"tag\">chernobyl dogs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/critical-infrastructure\/\" rel=\"tag\">critical infrastructure<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/critical-infrastructure-cybersecurity\/\" rel=\"tag\">critical infrastructure cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity\/\" rel=\"tag\">cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/layered-security\/\" rel=\"tag\">layered security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/manufacturing-cybersecurity\/\" rel=\"tag\">manufacturing cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/manufacturing-security\/\" rel=\"tag\">manufacturing security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nuclear-power\/\" rel=\"tag\">nuclear power<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nuclear-power-plant\/\" rel=\"tag\">nuclear power plant<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/soviet-union\/\" rel=\"tag\">Soviet Union<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vital-infrastructure\/\" rel=\"tag\">vital infrastructure<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/' title='Chernobyl\u2019s lessons for critical-infrastructure cybersecurity'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2019\/06\/chernobyls-lessons-for-critical-infrastructure-cybersecurity\/\">Chernobyl\u2019s lessons for critical-infrastructure cybersecurity<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14987,22074,22075,10420,22076,4500,20118,22077,22078,13236,8506,6262,21437],"class_list":["post-15623","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chernobyl","tag-chernobyl-disaster","tag-chernobyl-dogs","tag-critical-infrastructure","tag-critical-infrastructure-cybersecurity","tag-cybersecurity","tag-layered-security","tag-manufacturing-cybersecurity","tag-manufacturing-security","tag-nuclear-power","tag-nuclear-power-plant","tag-soviet-union","tag-vital-infrastructure"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15623"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15623\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}