Russian hackers targeted US nuclear scientists | The Business Standard
Skip to main content
  • Latest
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Monday
June 09, 2025

Sign In
Subscribe
  • Latest
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
MONDAY, JUNE 09, 2025
Russian hackers targeted US nuclear scientists

World+Biz

Reuters
06 January, 2023, 08:55 pm
Last modified: 06 January, 2023, 08:54 pm

Related News

  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Taiyeb warns of massive cyber attack ahead of polls
  • Iran repelled large cyber attack on Sunday
  • Musk says X targeted in 'massive cyberattack,' causing outage
  • US telecom company AT&T reportedly gave $370,000 to a hacker to delete its stolen customer data

Russian hackers targeted US nuclear scientists

Reuters
06 January, 2023, 08:55 pm
Last modified: 06 January, 2023, 08:54 pm
Russian hacking underground newsletter is seen in this illustration taken, December 19, 2022 REUTERS/Dado Ruvic/Illustration
Russian hacking underground newsletter is seen in this illustration taken, December 19, 2022 REUTERS/Dado Ruvic/Illustration

A Russian hacking team known as Cold River targeted three nuclear research laboratories in the United States this past summer, according to internet records reviewed by Reuters and five cyber security experts.

Between August and September, as President Vladimir Putin indicated Russia would be willing to use nuclear weapons to defend its territory, Cold River targeted the Brookhaven (BNL), Argonne (ANL) and Lawrence Livermore National Laboratories (LLNL), according to internet records that showed the hackers creating fake login pages for each institution and emailing nuclear scientists in a bid to make them reveal their passwords.

Reuters was unable to determine why the labs were targeted or if any attempted intrusion was successful. A BNL spokesperson declined to comment. LLNL did not respond to a request for comment. An ANL spokesperson referred questions to the U.S. Department of Energy, which declined to comment.

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

Cold River has escalated its hacking campaign against Kyiv's allies since the invasion of Ukraine, according to cybersecurity researchers and western government officials. The digital blitz against the U.S. labs occurred as U.N. experts entered Russian-controlled Ukrainian territory to inspect Europe's biggest atomic power plant and assess the risk of what both sides said could be a devastating radiation disaster amid heavy shelling nearby.

Cold River, which first appeared on the radar of intelligence professionals after targeting Britain's foreign office in 2016, has been involved in dozens of other high-profile hacking incidents in recent years, according to interviews with nine cybersecurity firms. Reuters traced email accounts used in its hacking operations between 2015 and 2020 to an IT worker in the Russian city of Syktyvkar.

"This is one of the most important hacking groups you've never heard of," said Adam Meyer, senior vice president of intelligence at U.S. cybersecurity firm CrowdStrike. "They are involved in directly supporting Kremlin information operations."

Russia's Federal Security Service (FSB), the domestic security agency that also conducts espionage campaigns for Moscow, and Russia's embassy in Washington did not respond to emailed requests for comment.

Western officials say the Russian government is a global leader in hacking and uses cyber-espionage to spy on foreign governments and industries to seek a competitive advantage. However, Moscow has consistently denied that it carries out hacking operations.

Reuters showed its findings to five industry experts who confirmed the involvement of Cold River in the attempted nuclear labs hacks, based on shared digital fingerprints that researchers have historically tied to the group.

The U.S. National Security Agency (NSA) declined to comment on Cold River's activities. Britain's Global Communications Headquarters (GCHQ), its NSA equivalent, did not comment. The foreign office declined to comment.

'INTELLIGENCE COLLECTION'

In May, Cold River broke into and leaked emails belonging to the former head of Britain's MI6 spy service. That was just one of several 'hack and leak' operations last year by Russia-linked hackers in which confidential communications were made public in Britain, Poland and Latvia, according to cybersecurity experts and Eastern European security officials.

In another recent espionage operation targeting critics of Moscow, Cold River registered domain names designed to imitate at least three European NGOs investigating war crimes, according to French cybersecurity firm SEKOIA.IO.

The NGO-related hacking attempts occurred just before and after the October 18 launch of a report by a U.N. independent commission of enquiry that found Russian forces were responsible for the "vast majority" of human rights violations in the early weeks of the Ukraine war, which Russia has called a special military operation.

In a blog post, SEKOIA.IO said that, based on its targeting of the NGOs, Cold River was seeking to contribute to "Russian intelligence collection about identified war crime-related evidence and/or international justice procedures." Reuters was unable independently to confirm why Cold River targeted the NGOs.

The Commission for International Justice and Accountability (CIJA), a nonprofit founded by a veteran war crimes investigator, said it had been repeatedly targeted by Russian-backed hackers in the past eight years without success. The other two NGOs, the International Center of Nonviolent Conflict and the Centre for Humanitarian Dialogue, did not respond to requests for comment.

Russia's embassy in Washington did not return a request seeking comment about the attempted hack against CIJA.

Cold River has employed tactics such as tricking people into entering their usernames and passwords on fake websites to gain access to their computer systems, security researchers told Reuters. To do this, Cold River has used a variety of email accounts to register domain names such as "goo-link[.]online" and "online365-office[.]com" which at a glance look similar to legitimate services operated by firms like Google and Microsoft, the security researchers said.

DEEP TIES TO RUSSIA Cold River made several missteps in recent years that allowed cybersecurity analysts to pinpoint the exact location and identity of one of its members, providing the clearest indication yet of the group's Russian origin, according to experts from Internet giant Google, British defense contractor BAE, and U.S. intelligence firm Nisos.

Multiple personal email addresses used to set up Cold River missions belong to Andrey Korinets, a 35-year-old IT worker and bodybuilder in Syktyvkar, about 1,600 km (1,000 miles) northeast of Moscow. Usage of these accounts left a trail of digital evidence from different hacks back to Korinets' online life, including social media accounts and personal websites.

Billy Leonard, a Security Engineer on Google's Threat Analysis Group who investigates nation state hacking, said Korinets was involved. "Google has tied this individual to the Russian hacking group Cold River and their early operations," he said.

Vincas Ciziunas, a security researcher at Nisos who also connected Korinets' email addresses to Cold River activity, said the IT worker appeared to be a "central figure" in the Syktyvkar hacking community, historically. Ciziunas discovered a series of Russian language internet forums, including an eZine, where Korinets had discussed hacking, and shared those posts with Reuters.

Korinets confirmed that he owned the relevant email accounts in an interview with Reuters but he denied any knowledge of Cold River. He said his only experience with hacking came years ago when he was fined by a Russian court over a computer crime committed during a business dispute with a former customer.

Reuters was able separately to confirm Korinets' links to Cold River by using data compiled through cybersecurity research platforms Constella Intelligence and DomainTools, which help identify the owners of websites: the data showed that Korinets' email addresses registered numerous websites used in Cold River hacking campaigns between 2015 and 2020.

It is unclear whether Korinets has been involved in hacking operations since 2020. He offered no explanation of why these email addresses were used and did not respond to further phone calls and emailed questions.

US nuclear industry / hacker / Cyber attack

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • A photo showing the former president on his return to Dhaka today (9 June). 
Source: Collected
    Former president Abdul Hamid returns to Bangladesh from Thailand
  • Inside the aid ship stormed by Israeli forces on 9 June 2025. Photo: BBC
    Israeli forces stormed aid boat carrying Greta Thunberg bound for Gaza: Freedom Flotilla Coalition
  • Protesters blocking the garage entrance of the Los Angeles Federal Building react as police fires pepper spray at them following multiple detentions by Immigration and Customs Enforcement (ICE), in downtown Los Angeles, California, US, June 6, 2025. REUTERS/Daniel Cole
    California governor calls Trump National Guard deployment in LA unlawful

MOST VIEWED

  • File Photo: British MP Tulip Siddiq attends a news conference with Richard Ratcliffe, the husband of jailed British-Iranian aid worker Nazanin Zaghari-Ratcliffe, in London, Britain October 11, 2019. Photo: REUTERS/Peter Nicholls/File Photo
    Tulip requests CA Yunus for a meeting over corruption allegations: Guardian
  • Representational image of Dhaka metro rail. Photo: Mumit M/TBS
    Metro rail takes Eid break today
  • Photo: Reuters
    Trump says Musk relationship over, warns of 'serious consequences' if he funds democrats
  • Representational image. Photo: Reuters
    Bangladesh reports 3 more Covid-19 cases
  • Muhammad Yunus (L) and Narendra Modi. Photo: Collected
    Modi sends Eid-ul-Adha greetings, Yunus calls for continued bilateral cooperation
  • Photo collage shows political posters in Bagerhat. Photos: Jannatul Naym Pieal
    From Sheikh Dynasty to sibling rivalry: Bagerhat signals a turning tide in local politics

Related News

  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Taiyeb warns of massive cyber attack ahead of polls
  • Iran repelled large cyber attack on Sunday
  • Musk says X targeted in 'massive cyberattack,' causing outage
  • US telecom company AT&T reportedly gave $370,000 to a hacker to delete its stolen customer data

Features

File photo of Eid holidaymakers returning to the capital from their country homes/Rajib Dhar

Dhaka: The city we never want to return to, but always do

1h | Features
Photo collage shows political posters in Bagerhat. Photos: Jannatul Naym Pieal

From Sheikh Dynasty to sibling rivalry: Bagerhat signals a turning tide in local politics

1d | Bangladesh
Illustration: TBS

Unbearable weight of the white coat: The mental health crisis in our medical colleges

4d | Panorama
(From left) Sadia Haque, Sylvana Quader Sinha and Tasfia Tasbin. Sketch: TBS

Meet the women driving Bangladesh’s startup revolution

5d | Panorama

More Videos from TBS

A Well-Organized and Unique Primary School in Dinajpur

A Well-Organized and Unique Primary School in Dinajpur

2h | TBS Stories
Why are traders worried about losses in the leather business again?

Why are traders worried about losses in the leather business again?

18h | TBS Stories
Why do political parties have different opinions about the elections in April?

Why do political parties have different opinions about the elections in April?

23h | TBS Stories
Power shift in Chinese politics, Is Li Qiang emerging in Xi Jinping's shadow?

Power shift in Chinese politics, Is Li Qiang emerging in Xi Jinping's shadow?

1d | TBS World
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net