Cyberattackers Target Nuclear Waste Company via LinkedIn

We Keep you Connected

Cyberattackers Target Nuclear Waste Company via LinkedIn

The hackers were unsuccessful in their attempt, but this is not the first time the company has experienced this kind of attack.
January 2, 2024
Last week, a group of hackers targeted Radioactive Waste Management (RWM), a UK government-owned company behind the country's multibllion-dollar Geological Disposal Facility (GDF) nuclear waste-storage project, using social engineering and LinkedIn.
RWM merged last year with two other companies to create Nuclear Waste Services (NWS), which also administers the Low Level Waste Repository in Cumbria, UK. Corhyn Parr, NWS's chief executive, noted that the attackers have been capitalizing on the business changes stemming from that merger to try to dupe targets into falling for social engineering gambits, largely through LinkedIn. So far, though, none of the attempts have had any "material effect," he added.
"NWS has seen, like many other UK businesses, that LinkedIn has been used as a source to identify the people who work within our business," a company spokesperson told the Guardian. The attackers, however, were denied through what a company spokesperson referred to as "multi-layered defenses."
Hackers will use social media sites to create fake accounts, write false messages, and send malicious links, as well as gather information to improve their messaging, all in order to gain access to a company's system through phishing or malware.
According to LinkedIn itself, in order to avoid becoming the victim of these types of scams or social engineering attacks, users should avoid engaging with impersonal messages, any messages asking for personal or financial information, messages with noticeable grammar and spelling mistakes, and messages including offers that are overly generous or “too good to be true.” 
Dark Reading Staff
Dark Reading
Dark Reading is a leading cybersecurity media site.
You May Also Like
2024 API Security Trends & Predictions
What’s In Your Cloud?
Everything You Need to Know About DNS Attacks
Tips for Managing Cloud Security in a Hybrid Environment
Black Hat Asia – April 16-19 – Learn More
Black Hat Spring Trainings – March 12-15 – Learn More
Cyber Resiliency 2023: How to Keep IT Operations Running, No Matter What
Passwords Are Passe: Next Gen Authentication Addresses Today’s Threats
The State of Supply Chain Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Threat Terrain of the Modern Factory: Survey of Programmable Assets and Robot Software
Pixelle’s OT Security Triumph with Security Inspection
IT Zero Trust vs. OT Zero Trust: It’s all about Availability
The OT Zero Trust Handbook: Implementing the 4 Cornerstones of OT Security
The Need for a Software Bill of Materials
Black Hat Asia – April 16-19 – Learn More
Black Hat Spring Trainings – March 12-15 – Learn More
Cyber Resiliency 2023: How to Keep IT Operations Running, No Matter What
Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.

source

TNC

LET US MANAGE YOUR SYSTEM
SO YOU CAN RUN YOUR BUSINESS

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE