Sellafield Nuclear Site's Cybersecurity Failures Led to the First-Ever Fine of a Nuclear Facility for Cyber Non-Compliance, Exposing Systemic Digital Vulnerabilities Across Aging Plants
infrastructureinfrastructure0 views
In October 2024, the UK's Office of Nuclear Regulation fined Sellafield Ltd — operator of Europe's largest nuclear site and home to the world's largest store of plutonium — over $440,000 for systemic cybersecurity non-compliance, marking the first time a nuclear facility has been fined for cyber failures, while in 2025, foreign hackers breached a U.S. nuclear weapons facility (NNSA) by exploiting Microsoft SharePoint vulnerabilities. Why it matters: nuclear facilities worldwide are transitioning from analog to digital control systems, creating new attack surfaces that legacy security cultures were not designed to address, so a successful cyberattack on reactor operational technology (OT) systems could potentially manipulate safety-critical functions, so the nuclear industry's hard-won safety record — which underpins public acceptance — could be destroyed by a single cyber-physical incident, so insurance markets and regulators may impose dramatically higher compliance costs that further erode nuclear economics, so nation-state adversaries (Russia, China, North Korea) have strong geopolitical motivation to develop capabilities against nuclear infrastructure. The structural root cause is that the nuclear industry's safety culture was built around physical and radiological threats over 70 years, cybersecurity was bolted on rather than designed in, many plants run legacy SCADA and industrial control systems that predate modern cyber threats, and the NRC's cyber regulations (10 CFR 73.54, effective 2009) are a compliance checkbox rather than a continuously adaptive defense framework.
Evidence
In October 2024, the UK Office of Nuclear Regulation fined Sellafield Ltd over $440,000 (GBP332,500) for cybersecurity non-compliance — the first such fine against any nuclear facility globally. Sellafield stores approximately 140 tonnes of plutonium. In July 2025, the NNSA confirmed it was breached via Microsoft SharePoint vulnerabilities (CVE-2025-53770 and CVE-2025-49704). The FBI issued a warning in July 2024 about increased cyber threats to energy and nuclear facilities from hacktivists and nation-states. A Chatham House report (July 2024) identified nuclear sector vulnerabilities including older/bespoke software, insufficient digital risk culture, and emerging risks around SMRs and microreactors. The NRC's cybersecurity rule (10 CFR 73.54) took effect in 2009 and has not been substantially updated. Sources: Chatham House (July 2024); CSO Online (2025); Industrial Cyber; NRC cybersecurity page; NTI Cyber-Nuclear Security Threats project.