Hacker Cracks Satellite Communications Network

Small+satellite+terminals+(VSAT)+are+vulnerable+to+Cyber+attack.gif

Small satellite terminals (VSAT) are vulnerable to Cyber attack.

A researcher says he can eavesdrop on, and even alter, data flowing through a satellite network operated by Globalstar, which provides communications services and equipment to militaries, oil companies, and many other organizations. “I can say with 100-percent confidence I did inject data back into the network,” Colby Moore, who works for a network security company called Synack, told reporters at the Black Hat cybersecurity conference.

Many organizations use Globalstar products to monitor assets in remote locations — say, equipping a fleet of trucks deep in the wilderness with satellite modems that periodically send their locations and operating conditions back to headquarters. The modems use the STX3 transmitter chip to send the data up to Globalstar’s orbiting Simplex constellation, where it is sent around the globe and back down to the proper ground station.

The STX3 doesn’t encrypt the data before it sends it. For less than $1000, Moore bought a simple software-defined radio system and a few other components to assemble a transceiver that allowed him to sniff the data as it headed into space.
He discovered that not only could he read the GPS coordinates that told him exactly where the GlobalStar-equipped assets were, but he was able to add his own fake information to the stream.

So far, he’s only been able to hack the uplink, not the downlink, but the data is the same, so stealing from the downlink doesn’t present a particularly tough challenge, he says. Moore said he told company officials about the vulnerability more than a month ago. He says they responded with concern, said Moore. 

How big a problem is this? If you rely on Globalstar’s Simplex network, your communications may be far more naked — and changeable — than you realize. A lot of military personnel use satellite phones and satellite tracking to communicate back home from dangerous deployments. Oil and gas companies use satellite-based geo-tracking to keep tabs on multimillion-dollar oil shipments. A lot of aviators use satellite tracking to reassure air traffic control that their plane isn’t deviating from course. Journalists and relief workers operating in dangerous locations often use satellite tracking so that they can be found in case they are kidnapped or go missing.

So what if an outsider can change your data in transit? Consider how the military might react if a small private plane appeared to be deviating from its flight path, making a beeline toward the White House. Or how the Navy might react if supertankers in the Strait of Hormuz suddenly vanished. Or how the Army might react if an enemy somehow knew just where to find U.S. soldiers lying in wait.

Globalstar has responded to repeated media inquiries with a statement offering assurance (but no real proof) that the situation was largely under control “Our engineers would know quickly if any person or entity was hacking our system in a material way and this type of situation has never been an issue to date. We are in the business of saving lives daily and will continue to optimize our offerings for security concerns and immediately address any illegal actions taken against our company.”

Then there are the vulnerabilities in infrastructure. Globalstar’s satellite tracking is “used heavily in [supervisory control and data acquisition] systems, water pipeline monitoring,” said Moore. And in June, the company announced that they would integrate its services with Lockheed Martin Flight Services to provide satellite location data to non-commercial pilots.
It’s not immediately clear just how many militaries rely on the company’s Simplex network. Pentagon officials could not immediately respond to requests for comment. But Spain and other NATO allies have well-publicized business contracts with the company.

Globalstar’s testimonial page offers this note from a U.S. Army captain who was operating in Iraq: “I can’t even begin to tell you what a lifeline your phone has been for us. You should know that one of my fellow soldiers was able to hear the cry of his newborn son thanks to your system. It is much appreciated.”

DefenseOne

 

« Japan: Court Rules Against Bitcoin Compensation
US Spies on EU Companies »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

Tenable

Tenable

Organizations around the world rely on Tenable to help them understand and reduce cybersecurity risk across their attack surface—in the cloud or on-premises, from IT to OT and beyond.

QuantumCTek

QuantumCTek

QuantumCTek is a Chinese pioneer and leader in commercialized quantum information technology (QIT).

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.