North Korea Hacked India's Moon Mission

North Korean hackers have reportedly attacked Indian space agency systems. According to cyber experts, the Indian Space Research Organisation (ISRO) was attacked by hackers when it was on its mission to land a spacecraft on the Moon. 

India’s ambitious mission had attempted a historic soft landing on the lunar south pole region.

The country’s mission to the Moon faced a setback when a control station in the southern Indian city of Bengaluru lost contact with the Chandrayaan-2 spacecraft in September just minutes before its landing on the Moon. The reports said an ISRO staff member is feared to have opened phishing emails from North Korean spammers.Such phishing emails caused the accidental installation of malware on to their systems.

According to a Financial Times report, ISRO was warned of the cyberattack during the Chandrayaan-2 Moon mission. ISRO insisted that its computer systems and networks had not been ‘compromised’ by the attempted hacking. The space agency will now have to examine the possible threat from North Korean spammers.

Indian officials have denied that a cyberattack affected the Moon mission, which ended after ISRO lost contact with the spacecraft.

The latest news has emerged after India’s largest nuclear power plant admitted it had been attacked by hackers. Indian authorities admitted there had been a cyber-attack on the Kudankulam nuclear power plant, located in the southern Indian state of Tamil Nadu. However, the hackers were found to have targeted an administrative computer.

Last month, the US space agency NASA found no trace of Chandrayaan-2’s Vikram lander in the latest photographic  images captured by its Moon orbiter of the lunar south pole region. 

Eastern Eye:         Image: ISRO

You Might Also Read: 

Communications Satellites Are Vulnerable:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

 

 

 

 

 

« Four Security Principles For For Small Business
Ethical Hackers And Criminal Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

HEAL Security

HEAL Security

HEAL Security is the global authority for cybersecurity data, research and insights across the healthcare sector.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.