North Korea Hacked India's Moon Mission

North Korean hackers have reportedly attacked Indian space agency systems. According to cyber experts, the Indian Space Research Organisation (ISRO) was attacked by hackers when it was on its mission to land a spacecraft on the Moon. 

India’s ambitious mission had attempted a historic soft landing on the lunar south pole region.

The country’s mission to the Moon faced a setback when a control station in the southern Indian city of Bengaluru lost contact with the Chandrayaan-2 spacecraft in September just minutes before its landing on the Moon. The reports said an ISRO staff member is feared to have opened phishing emails from North Korean spammers.Such phishing emails caused the accidental installation of malware on to their systems.

According to a Financial Times report, ISRO was warned of the cyberattack during the Chandrayaan-2 Moon mission. ISRO insisted that its computer systems and networks had not been ‘compromised’ by the attempted hacking. The space agency will now have to examine the possible threat from North Korean spammers.

Indian officials have denied that a cyberattack affected the Moon mission, which ended after ISRO lost contact with the spacecraft.

The latest news has emerged after India’s largest nuclear power plant admitted it had been attacked by hackers. Indian authorities admitted there had been a cyber-attack on the Kudankulam nuclear power plant, located in the southern Indian state of Tamil Nadu. However, the hackers were found to have targeted an administrative computer.

Last month, the US space agency NASA found no trace of Chandrayaan-2’s Vikram lander in the latest photographic  images captured by its Moon orbiter of the lunar south pole region. 

Eastern Eye:         Image: ISRO

You Might Also Read: 

Communications Satellites Are Vulnerable:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

 

 

 

 

 

« Four Security Principles For For Small Business
Ethical Hackers And Criminal Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Next DLP

Next DLP

Next DLP (formerly Jazz Networks) is a leading provider of insider risk and data protection solutions.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.