DEF CON Conference: White-hat hackers demonstrated the remote control of a retired satellite

0 25
On August 20th, at the DEF CON hacker conference,White-hat hacker organization S...

On August 20th, at the DEF CON hacker conference,White-hat hacker organization Shadytel demonstrated the remote hijacking of a retired satellite on-site and used it to play movies.

在上周末拉斯维加斯举行的DEF CON黑客大会上,该组织使用Hack RF设备与加拿大卫星Anik F1R连接,然后播放经典的黑客电影,如《战争游戏》;此外,该组织还利用退役卫星建立电话会议链接。

DEF CON Conference: White-hat hackers demonstrated the remote control of a retired satellite

Anik F1R是一颗2020年退役的卫星,停用前由加拿大Telesat运营,目前这颗卫星在地球上空大约35786公里(22236英里)的静止轨道。静止轨道也被称为垃圾轨道,它远离普通运行轨道,一些卫星在其运行寿命结束时被移入这种轨道,以避免与运行中的航天器和卫星发生碰撞。

由于可以进入一个废弃的uplink(上行链路)设施并连接卫星的硬件,黑客们决定 "玩一玩"这颗卫星。Shadytel成员卡尔·科舍尔(Karl Koscher)在Def Con的一次演讲中说:"我们拥有上行链路的访问证以及卫星应答器的访问条件。应答器是一个在接收天线和发射天线之间打开通道的装置。卫星基本上只是反射向接收到的所有信号。"

科舍尔及其小组强调,威胁者一旦进入上行链路设施,就有可能控制退役的卫星进行恶意活动。他解释,入侵连接卫星的硬件是相当容易的,该小组使用了一个能够传输或接收1MHz至6GHz无线电信号的Hack RF软件定义无线电外围设备,该软件仅需300美元左右

在黑客大会上,来自比利时的安全研究人员对Starlink卫星进行了另一次攻击演示。他使用手工制作的印刷电路板访问了SpaceX的太空互联网网络。虽然演示没有对Starlink网络或退役的卫星造成损害,但对卫星的恶意黑客攻击可能造成毁灭性后果。

今年早些时候,俄罗斯黑客以美国卫星公司Viasat为目标,利用一种破坏性的恶意软件抹去了该系统所有数据。若干小时后,俄罗斯军队在部分通信中断的情况下入侵乌克兰,因为乌克兰军队依靠Viasat公司的服务来控制其武装部队。

参考链接:

https://securityaffairs.co/wordpress/134637/hacking/hackers-take-control-decommissioned-satellite.html

https://www.independent.co.uk/tech/hack-satellite-hijack-def-con-b2147595.html

你可能想看:

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

EMOTET banking trojan is still active: shellcode release methods, infrastructure updates, and traffic encryption

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

4. Significance for the construction and development of the entire network security threat intelligence sharing system

Deception defense for advanced threat detection: enhance security orchestration, automation, and response capabilities

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

A Brief Discussion on the Establishment of Special Security Management Organizations for Operators of Key Information Infrastructure

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

最后修改时间:
admin
上一篇 2025年03月28日 08:55
下一篇 2025年03月28日 09:18

评论已关闭