Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Satellite Telecom Vulnerable to Hackers: Researchers

WASHINGTON – Security flaws in many satellite telecommunications systems leave them open to hackers, raising potential risks for aviation, shipping, military and other sectors, security researchers said Thursday.

A paper released by the security firm IOActive found “multiple high risk vulnerabilities” in all the satellite systems studied.

WASHINGTON – Security flaws in many satellite telecommunications systems leave them open to hackers, raising potential risks for aviation, shipping, military and other sectors, security researchers said Thursday.

A paper released by the security firm IOActive found “multiple high risk vulnerabilities” in all the satellite systems studied.

“These vulnerabilities have the potential to allow a malicious actor to intercept, manipulate, or block communications, and in some cases, to remotely take control of the physical device,” the report said.

Ruben Santamarta, author of the report, said he was concerned “because satellite communications are used in a variety of critical scenarios.”

Santamarta told AFP that most ships and aircraft use satellite communications, and in some cases military communications use these commercial satellite systems.

If the systems are compromised, he said, “for military communications, a foreign government or agency can target these devices and they can track the location of units and soldiers.”

For aircraft or ships, he said, an attacker “can spoof data” and either block or disrupt emergency communications.

Because of the nature of the systems using satellites, Santamarta said, “we expected better security.”

Advertisement. Scroll to continue reading.

Santamarta said he had no evidence of any disruption affecting Malaysia Airlines flight MH370, but noted that “it is technically possible” that its communications could have been tampered with.

The IOActive report studied communications over the Inmarsat and Iridium satellite networks. But Santamarta said the vulnerabilities were mainly in ground equipment which connects to the satellites.

“IOActive found that malicious actors could abuse all of the devices within the scope of this study,” the report said.

“The vulnerabilities included what would appear to be back doors, hard-coded credentials, undocumented and/or insecure protocols, and weak encryption algorithms.”

The company began its research in 2013, and in early 2014, a security warning was issued by the Computer Emergency Response Team, a group of researchers backed by the US Department of Homeland Security.

IOActive said however that most of the satellite telecom (SATCOM) vendors did not respond to the January alert to upgrade their systems despite the nature of the risks.

“If one of these affected devices can be compromised, the entire SATCOM infrastructure could be at risk,” the report said.

“Ships, aircraft, military personnel, emergency services, media services, and industrial facilities (oil rigs, gas pipelines, water treatment plants, wind turbines, substations, etc.) could all be impacted by these vulnerabilities.”

Santamarta added, “I hope this research is seen as a wake-up call for both the vendors and users of the current generation of SATCOM technology.”

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

The US arm of networking giant TP-Link has appointed Adam Robertson as Director of Information and Security.

Raj Dodhiawala has been named Chief Product Officer at Eclypsium.

Cyber exposure management firm Armis has promoted Alex Mosher to President.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.