North Korea Hacked India's Moon Mission

North Korean hackers have reportedly attacked Indian space agency systems. According to cyber experts, the Indian Space Research Organisation (ISRO) was attacked by hackers when it was on its mission to land a spacecraft on the Moon. 

India’s ambitious mission had attempted a historic soft landing on the lunar south pole region.

The country’s mission to the Moon faced a setback when a control station in the southern Indian city of Bengaluru lost contact with the Chandrayaan-2 spacecraft in September just minutes before its landing on the Moon. The reports said an ISRO staff member is feared to have opened phishing emails from North Korean spammers.Such phishing emails caused the accidental installation of malware on to their systems.

According to a Financial Times report, ISRO was warned of the cyberattack during the Chandrayaan-2 Moon mission. ISRO insisted that its computer systems and networks had not been ‘compromised’ by the attempted hacking. The space agency will now have to examine the possible threat from North Korean spammers.

Indian officials have denied that a cyberattack affected the Moon mission, which ended after ISRO lost contact with the spacecraft.

The latest news has emerged after India’s largest nuclear power plant admitted it had been attacked by hackers. Indian authorities admitted there had been a cyber-attack on the Kudankulam nuclear power plant, located in the southern Indian state of Tamil Nadu. However, the hackers were found to have targeted an administrative computer.

Last month, the US space agency NASA found no trace of Chandrayaan-2’s Vikram lander in the latest photographic  images captured by its Moon orbiter of the lunar south pole region. 

Eastern Eye:         Image: ISRO

You Might Also Read: 

Communications Satellites Are Vulnerable:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

 

 

 

 

 

« Four Security Principles For For Small Business
Ethical Hackers And Criminal Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.