In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion, claimed to have gained unauthorized access to the Negev Nuclear Research Center (NNRC) in Dimona, Israel. The group asserted that they manipulated key reactor components and operated within the facility’s systems for 84 minutes on March 10, 2026. However, a technical review of the evidence reveals significant discrepancies, leading experts to suggest that this could be a well-executed psychological operation rather than a confirmed cyber intrusion.
The cyberattack was allegedly conducted over a two-month period, with the CARDINAL group purporting to have executed a sophisticated operation within the highly sensitive NNRC systems. They claimed to have tampered with reactor control elements, including control rods and cooling systems. In their statements, the attackers emphasized that they had full control over critical infrastructure, claiming to leave no trace of their presence: “We don’t need your data. We own your infrastructure,” they boasted.
The attackers also released several images, including SCADA interface screenshots and Windows event logs, purporting to show evidence of the intrusion. The group’s release was strategically framed with theatrical messaging, including claims like, “We have four rods that moved by themselves” and “You have 84 minutes of logs you can’t explain,” all of which are typical of hacktivist psychological operations intended to create fear and uncertainty.
Upon examination, the released images exhibit numerous inconsistencies that raise doubts about their authenticity.
The first two images purportedly showing the reactor control interface contain several anomalies. For example, the interface labels core temperature and pressure readings in a suspiciously cinematic style. Furthermore, the use of mixed Hebrew and English in the UI design and the overly generic look of the control system suggest these visuals are not consistent with real industrial control systems, which typically follow more standardized design protocols.
Figure 1. Alleged reactor control interface showing Reactor #2 telemetry, control rod deviation alerts, and cooling-related indicators.
Figure 2. Second reactor interface image released by the threat actor, again emphasizing rod anomalies and operational instability.
Figure 3 image claims to show Windows event logs with multiple suspicious entries, such as event IDs related to control rod movement and automatic SCRAM (emergency shutdown). These event logs, however, appear highly inconsistent with how real nuclear control systems log critical events.
Figure 3. Alleged incident response evidence showing PowerShell event logs, forensic artifacts, and network connections tied to the Dimona claim.
The inclusion of non-standard event IDs and a suspicious domain reference, “shalepoint.com” (a misspelled imitation of Microsoft SharePoint), further cast doubt on the legitimacy of these logs.
Additionally, an analysis of the Telegram campaign revealed that the material was disseminated in a highly organized manner, with the group’s identity linked to several other posts related to the Dimona narrative.
This suggests that the CARDINAL group’s campaign was part of a larger psychological influence operation rather than an isolated hacking attempt.
Several factors suggest the material is fabricated or heavily staged:
Despite the alarming claims made by CARDINAL, there is no verifiable evidence to suggest that the Negev Nuclear Research Center was compromised in this incident. The technical examination of the provided materials, coupled with the theatrical language of the attackers, indicates that this may be a hacktivist-driven influence operation rather than a confirmed breach of critical infrastructure.
This incident serves as a reminder of the growing prevalence of psychological operations in cyberspace, aimed not at causing immediate damage but at manipulating public perception and creating a sense of insecurity around national security. The true intent behind the CARDINAL group’s actions remains unclear, but their campaign highlights the increasingly sophisticated nature of cyber warfare and its potential impact on critical infrastructure.