Aircraft Can Be Successfully Hacked In-Flight

IOActive researcher will demonstrate at Black Hat USA (4th-9th August Ls Vegas) how satellite equipment can be 'weaponised.'

It's been four years since researcher Ruben Santamarta rocked the security world with his chilling discovery of major vulnerabilities in satellite equipment that could be abused to hijack and disrupt communications links to airplanes, ships, military operations, and industrial facilities.

Santamarta has now proven out those findings and taken his research to the level of terrifying, by successfully hacking into in-flight airplane WiFi networks and Satcom equipment from the ground. 

"As far as I know I will be the first researcher that will demonstrate that it's possible to hack into communications devices on an in-flight aircraft … from the ground," he says.

He accessed on-board WiFi networks including passengers' Internet activity, and also was able to reach the planes' Satcom equipment, he says, all of which in his previous research he had concluded, but not proven, was possible.  Furthermore: "In this new research, we also managed to get access to important communications devices in the aircraft," Santamarta, principal security consultant with IO/Active, says.

That's as much detail about the hack that Santamarta will share publicly before his Black Hat talk, where he plans to demonstrate just how he gained access to the aircraft and on-board satellite communications devices. He'll show how Satcom gear could be weaponised as a radio frequency (RF) tool, he says, that ultimately could "pose security risks" to the aircraft.
Santamarta's previous work on hacking an airplane network had been met with some skepticism. "Everybody told us it was impossible. But basically, it's possible, and we [now] have proof and [will] present the proof of that."

He says he used similar Satcom hacking techniques to locate multiple NATO military installations in conflict zones, which were exposed on the Internet, and employed similar methods to access maritime vessels' networks at sea, the details of which he'll also cover in his talk.

Not surprisingly, the vulnerability disclosure process associated with the research was, he says, "extremely sensitive." Santamarta contacted all of the affected parties, he says, and ensured that no hacks he performed would put anyone in physical danger, for instance. "We improved … security and safety" with this research, he says.
Security Holes

In his 2014 research, Santamarta provided a report on several possible attack scenarios using the vulnerabilities he had discovered in the firmware of popular satellite ground terminal equipment. In his latest research he studied other Satcom systems and infrastructure and found the usual suspects of industrial Internet of Things flaws: backdoors, insecure protocols, and hard-coded credentials as well as buffer overflows, code injections, and exposed services.

These vulnerabilities "allowed us to take control of these devices and allow anyone to access the satellite services," he says. "We can leverage Satcom devices to perform cyber-physical attacks."

But like with Santamarta's previous research, the affected vendors and providers unfortunately aren't all on board with fixes for the newly discovered security holes. "The critical things have been fixed mostly. But there are other significant vulnerabilities that are still there, and that’s a still a problem," he says.

"The Satcom environment right now is really a mess. That's one of the reasons we called this talk 'The Last Call for Satcom Security,'" he says. "It's really worrying me what I am seeing in this area."

He declined to discuss in detail just how much damage an attacker could do with the aircraft hack they pulled off, saying: "This has to be explained carefully, and we've got all the technical details backing our claim. It's not an apocalypse, but basically there are some scenarios that are possible" that will be covered at Black Hat, he says.

In his 2014 research, Santamarta found that an in-flight airline WiFi network was vulnerable to malicious behavior via vulnerable Cobham AVIATOR 700 satellite terminals on the WiFi. 

The danger there was an attacker gaining control over the Satellite Data Unit or the SwiftBroadband Unit interface by taking advantage of the weak password reset feature, hardcoded credentials, or the insecure protocols in the terminal. Santamarta's new research illustrates just how an attacker could abuse Satcom and other equipment vulnerabilities. He says he spotted hundreds of "exposed" aircraft from multiple airlines, but only focused on a few in his hacking research.

"These are real cases. They are no longer theoretical scenarios," he says of his new research. "We are using vulns in Satcom devices to turn those devices into weapons" to trigger cyber-physical effects, he says.

There are two other known airplane-hacking research projects, but neither were accomplished from the ground to a flying plane like Santamarta's. 

The first was a controversial and disputed one in May of 2015, when security researcher Chris Roberts was accused by the FBI of hacking into an aircraft's controls via the WiFi network from his airplane seat, causing the airplane to briefly climb and move sideways, or laterally. 

Roberts at the time said the FBI's assessment of his experiment was overblown, and he later reportedly said the charges had been dropped.

A US Department of Homeland Security official in 2017 revealed at a satellite conference that his team had remotely hacked into a parked Boeing 757 at the Atlantic City, NJ, airport, using RF communications.  

Dark Reading

You Might Also Read: 

The Cyber Threat To Airports:

MH370 Loss Could Have Been A Remote Skyjacking:
 

« Ex-GCHQ Boss: Nation State Cyber-Attacks Affect Everyone
A Looming US vs China Tech War Over Huawei »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.

Hanwha Systems

Hanwha Systems

Hanwha Systems is a global company based in South Korea providing defense electronics and smart ICT solutions.