- Gone Phishing
- Posts
- UK nuclear site hacked by Russian & Chinese hackers
UK nuclear site hacked by Russian & Chinese hackers

Welcome to Gone Phishing, your daily cybersecurity newsletter that thinks cybercriminals hacked our Advent calendar πππ
Todayβs hottest cybersecurity news stories:
β’οΈ UK nuclear site hacked by Russian & Chinese hackers π¨βπ»
β οΈ Microsoft warns that CACTUS is back via malvertising π
π« Group of UEFI flaws named logoFAIL expose devices πͺ
Seriously, Chernobylshit π
π¨ UK's Sellafield Nuclear Site Hacked by Russia and China-Linked Cyber Groups π¨
In a shocking revelation, a decade-long cyber breach at Sellafield, the UK's most hazardous nuclear site, has come to light. π Cybersecurity failings, potentially compromising activities like moving radioactive waste, have been covered up by senior staff, raising concerns about national security. π±
The breach, dating back to 2015, involves sleeper malware embedded in Sellafield's networks, with uncertain eradication status. The facility, sprawling 6 sq km on the Cumbrian coast, holds the world's largest plutonium store. π»π
Sellafield's failure to alert regulators for years has hindered quantifying data loss and ongoing risks. π¬ The site, under "special measures" for cybersecurity, faces potential prosecution.
Labour's Ed Miliband calls for urgent government action, highlighting the seriousness of this report on critical energy infrastructure. ππ
Concerns include insecure servers (dubbed Voldemort), external contractors' unsupervised access, and inadvertent BBC broadcast of secure login details.
β οΈ Cyber threats from Russia and China pose significant risks, leading to heightened alerts from GCHQ. The Office for Nuclear Regulation (ONR) urges improvements, with potential new systems at the emergency control center.
Sellafield, vital for the UK's nuclear industry expansion, costs Β£2.5bn/year to operate. Decommissioning, a massive undertaking, is estimated at Β£263bn, a fiscal risk according to the Office for Budget Responsibility. πΈπ
Sellafield assures multiple cybersecurity layers and collaboration with regulators. ONR emphasises ongoing investigations and high cybersecurity standards.
The Department for Energy Security and Net Zero assures public safety, acknowledging historical issues and expecting regular updates on improvements. π‘οΈπ
Stay informed and secure! π°π

eBook: How to minimize third-party risk with vendor management
A robust vendor management program isnβt just required by compliance frameworks like SOC 2 and ISO 27001. Itβs also a critical part of a holistic trust management strategy.
Implementing a vendor management program, however, has become more complex and challenging with the proliferation of SaaS tools and shadow IT. And many overstretched security teams are being asked to do more with less.
To stay compliant and secure β and deepen trust with customers and partners β security teams need a way to proactively manage vendor risk.
This guide from Vanta, the leading trust management platform, brings together perspectives from the frontlines of vendor security management. Get insights and best practices from security and compliance leaders.

Microsoft: Watch out for Operation Desert Storm π΅ππΎ
π¨ Alert: New Wave of CACTUS Ransomware Attacks! π¨
Microsoft issues a warning about the latest cyber threatβCACTUS ransomware attacks! π±π These attacks use malvertising lures to deploy DanaBot, a multifunctional tool acting as an entry point for next-stage payloads. π€π»
The Microsoft Threat Intelligence team reveals that DanaBot infections lead to hands-on-keyboard activity by ransomware operator Storm-0216 (Twisted Spider, UNC2198), culminating in the deployment of CACTUS ransomware. πͺοΈπΌ
UNC2198, known for deploying Maze and Egregor ransomware, has previously used QakBot infections for initial access. The shift to DanaBot likely stems from a coordinated law enforcement operation in August 2023 that took down QakBot's infrastructure. π΅οΈββοΈπ«
The ongoing Danabot campaign, observed since November, uses a private version of the info-stealing malware. ππΎ Credentials harvested by the malware are sent to an actor-controlled server, enabling lateral movement via RDP sign-in attempts and granting access to Storm-0216. ππͺ
This alert follows recent CACTUS ransomware attacks exploiting vulnerabilities in Qlik Sense and the discovery of a new macOS ransomware called Turtle, written in the Go programming language. Stay vigilant, update security measures, and protect your systems! π‘οΈπ

π£ Catch of the Day!! πππ¦
π The Motley Fool: βFool me once, shame on β shame on you. Fool me β you can't get fooled again.β Good olβ George Dubya π Let us tell whoβs not fooling around though; thatβs the CrΓΌe π at Motley Fool. Youβd be a fool (alright, enough already! π) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! π Kidding aside, if you check out their website theyβve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets π€ (LINK)
π΅ Wander: Find your happy place. Cue Happy Gilmore flashback ποΈβ³πποΈ Mmmm Happy Placeβ¦ π So, weβve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itβs easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ποΈπ (LINK)
π Digital Ocean: If you build it they will come. Nope, weβre not talking about a baseball field for ghosts βΎπ»πΏ (Great movie, to be fair π). This is the Digital Ocean whoβve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youβll find yourself catching the buzz even if you canβt code (guilty π). But if you can and youβre looking for somewhere to test things out or launch something new or simply enhance what youβve got, weβd recommend checking out their services foβ sho π And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! πΏ (LINK)

logoFAILArmy π€¦
π‘οΈ Security Alert: LogoFAIL Vulnerabilities Found in UEFI Firmware! π
A critical security flaw dubbed LogoFAIL has been discovered in the Unified Extensible Firmware Interface (UEFI) code used by various independent firmware/BIOS vendors. π¨π» These vulnerabilities pose a significant risk, allowing threat actors to bypass Secure Boot, Intel Boot Guard, and other security technologies embedded in the firmware.
LogoFAIL can be exploited to inject a malicious logo image file into the EFI system partition during the boot phase, leading to persistent malware delivery and compromise of the system's security. π±π The vulnerabilities, affecting both x86 and ARM-based devices, involve heap-based buffer overflow and out-of-bounds read flaws in image parsing libraries.
Notably, this attack vector doesn't break runtime integrity like previous threats, such as BlackLotus or BootHole. However, it raises concerns as it can give attackers a stealthy advantage in bypassing endpoint security solutions and deploying persistent firmware bootkits. π€π’
Major firmware vendors like AMI, Insyde, and Phoenix, along with devices from Intel, Acer, Lenovo, and others, are affected, making LogoFAIL a widespread and severe issue. Stay tuned for details to be revealed at the upcoming Black Hat Europe conference. ππ

ποΈ Extra, Extra! Read all about it!
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.
Libby Copa: The Rebel Newsletter helps writers strengthen their writing and creative practice, navigate the publishing world, and turn their art into an act of rebellion.
Techspresso: Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)
Let us know what you think!
So long and thanks for reading all the phish!
Give us a rating? |




