Hacker Cracks Satellite Communications Network

Small+satellite+terminals+(VSAT)+are+vulnerable+to+Cyber+attack.gif

Small satellite terminals (VSAT) are vulnerable to Cyber attack.

A researcher says he can eavesdrop on, and even alter, data flowing through a satellite network operated by Globalstar, which provides communications services and equipment to militaries, oil companies, and many other organizations. “I can say with 100-percent confidence I did inject data back into the network,” Colby Moore, who works for a network security company called Synack, told reporters at the Black Hat cybersecurity conference.

Many organizations use Globalstar products to monitor assets in remote locations — say, equipping a fleet of trucks deep in the wilderness with satellite modems that periodically send their locations and operating conditions back to headquarters. The modems use the STX3 transmitter chip to send the data up to Globalstar’s orbiting Simplex constellation, where it is sent around the globe and back down to the proper ground station.

The STX3 doesn’t encrypt the data before it sends it. For less than $1000, Moore bought a simple software-defined radio system and a few other components to assemble a transceiver that allowed him to sniff the data as it headed into space.
He discovered that not only could he read the GPS coordinates that told him exactly where the GlobalStar-equipped assets were, but he was able to add his own fake information to the stream.

So far, he’s only been able to hack the uplink, not the downlink, but the data is the same, so stealing from the downlink doesn’t present a particularly tough challenge, he says. Moore said he told company officials about the vulnerability more than a month ago. He says they responded with concern, said Moore. 

How big a problem is this? If you rely on Globalstar’s Simplex network, your communications may be far more naked — and changeable — than you realize. A lot of military personnel use satellite phones and satellite tracking to communicate back home from dangerous deployments. Oil and gas companies use satellite-based geo-tracking to keep tabs on multimillion-dollar oil shipments. A lot of aviators use satellite tracking to reassure air traffic control that their plane isn’t deviating from course. Journalists and relief workers operating in dangerous locations often use satellite tracking so that they can be found in case they are kidnapped or go missing.

So what if an outsider can change your data in transit? Consider how the military might react if a small private plane appeared to be deviating from its flight path, making a beeline toward the White House. Or how the Navy might react if supertankers in the Strait of Hormuz suddenly vanished. Or how the Army might react if an enemy somehow knew just where to find U.S. soldiers lying in wait.

Globalstar has responded to repeated media inquiries with a statement offering assurance (but no real proof) that the situation was largely under control “Our engineers would know quickly if any person or entity was hacking our system in a material way and this type of situation has never been an issue to date. We are in the business of saving lives daily and will continue to optimize our offerings for security concerns and immediately address any illegal actions taken against our company.”

Then there are the vulnerabilities in infrastructure. Globalstar’s satellite tracking is “used heavily in [supervisory control and data acquisition] systems, water pipeline monitoring,” said Moore. And in June, the company announced that they would integrate its services with Lockheed Martin Flight Services to provide satellite location data to non-commercial pilots.
It’s not immediately clear just how many militaries rely on the company’s Simplex network. Pentagon officials could not immediately respond to requests for comment. But Spain and other NATO allies have well-publicized business contracts with the company.

Globalstar’s testimonial page offers this note from a U.S. Army captain who was operating in Iraq: “I can’t even begin to tell you what a lifeline your phone has been for us. You should know that one of my fellow soldiers was able to hear the cry of his newborn son thanks to your system. It is much appreciated.”

DefenseOne

 

« Japan: Court Rules Against Bitcoin Compensation
US Spies on EU Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

Quantum Dice

Quantum Dice

Quantum Dice is an award-winning venture-backed spinout from Oxford University’s world-renowned quantum optics laboratory.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.