'How We Sharpened the James Webb Telescope's Vision From a Million Kilometers Away'
Read more of this story at Slashdot.
Read more of this story at Slashdot.
How much private and sensitive data can you get by pointing $600 worth of satellite equipment at the sky?
Quite a bit, it turns out.
Researchers from the University of Maryland and the University of California, San Diego say they were able to intercept sensitive data from the U.S. military, telecommunications firms, major businesses and organizations by passively scanning and collecting unencrypted data from the satellites responsible for beaming that information across the globe.
The satellites they focused on β geostationary satellites β provide modern high-speed communications and services to rural or remote parts of the globe, including television, IP communications, internet and in-flight Wi-Fi capabilities. They also provide backhaul internet services β the links between a core telecom or internet network and its end users β for private networks operating sensitive remote commercial and military equipment.
Using cheap, commercially available equipment, researchers scanned 39 satellites across 25 distinct longitudinal points over seven months.
The goal was to see how much sensitive data they could intercept by βpassively scanning as many GEO transmissions from a single vantage point on Earth as possible.β It was also to prove that you donβt need to be a well-resourced foreign intelligence service or have deep pockets to pull it off.
What they found was unsettling: βMany organizations appear to treat satellite[s] as any other internal link in their private networks. Our study provides concrete evidence that network-layer encryption protocols like IPSec are far from standard on internal networks,β write authors Wenyi Zhang, Annie Dai, Keegan Ryan, Dave Levin, Nadia Heninger and Aaron Schulman.
They note that βseverityβ of their findings suggest βmany organizations do not routinely monitor the security of their own satellite communication linksβ and that content scrambling βis surprisingly unlikely to be used for private networks using GEO satellite to backhaul IP network traffic from remote areas.β
βGiven that any individual with a clear view of the sky and $600 can set up their own GEO interception station from Earth, one would expect that GEO satellite links carrying sensitive commercial and government network traffic would use standardized link and/or network layer encryption to prevent eavesdroppers,β the researchers wrote.
Wired first reported on the academic study.
Researchers reached out to major businesses and organizations that were leaking data via satellite communications to notify them and address the vulnerabilities, but said they declined to engage in any bug bounties that included a nondisclosure agreement.Β Β
The researchers said discussions with the U.S. military, the Mexican government, T-Mobile, AT&T, IntelSat, Panasonic Avionics, WiBo and KPU all took place between December 2024 and July 2025 as the study was ongoing.
Satellites are outfitted with multiple transponders to collect different kinds of telemetry, and here the research focuses on a single type β Ku-Band transponders β that are heavily used for internet and television services. Using their consumer-grade equipment, the researchers were able to tap into 411 different transponders around the globe, collecting reams of sensitive data in the process.
They observed unencrypted data for T-Mobile users, including plaintext user SMS messages, voice call contents, user internet traffic, metadata, browsing history and cellular network signaling protocols, leaking out over the skies. Over a single, nine-hour listening session, the dish picked up phone numbers and metadata for 2,711 individuals. Similar leakages were spotted for calls over Mexican telecoms TelMex and WiBo, and Alaskan telecom KPU Telecommunications.
They also picked up unencrypted and encrypted traffic coming from U.S. military sea vessels, including plaintext that included the shipsβ names β something the researchers said allowed them to determine they were all βformerly privately-owned shipsβ that are now owned by the government. Meanwhile, unencrypted HTTP traffic leaking out through the satellites gave them details into internal applications and systems used for infrastructure, logistics and administrative management.
The researchers say that while this kind of capability isnβt novel, previous research has suggested that only foreign governments and well-resourced companies have the capabilities to conduct such widespread monitoring. Their study, which developed a new way to parse through issues around signal quality, suggests that the barrier of entry is far lower than previously thought, requiring technical knowhow and just a few hundred dollars worth of commercial tech.
βTo our knowledge, our threat model of using low-cost consumer grade satellite equipment to comprehensively survey GEO satellite usage has not been explored before in the academic literature.β
The findings underscore how much governments and businesses rely on standard satellite communications today to move their data around, and the lack of security attention these critical nodes receive compared to other technologies.The federal government has designated 16 sectors of society and industry as βcritical infrastructureβ and prioritized these sectors for additional security investment and assistance. Space is not one of those sectors, though policymakers have pushed the idea as a means to quickly retrofit our space-based communications for security.Β
The post Researchers find a startlingly cheap way to steal your secrets from spaceΒ appeared first on CyberScoop.
Read more of this story at Slashdot.
The aerospace and defense giant has disclosed the cyberattack in a filing with the SEC.
The post RTX Confirms Airport Services Hit by Ransomware appeared first on SecurityWeek.
Cybersecurity researchers believe the attack on Collins Aerospace involved a piece of ransomware known as HardBit.
The post European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested appeared first on SecurityWeek.
Collins Aerospace is reportedly having difficulties recovering from the ransomware attack.
The post European Airport Disruptions Caused by Ransomware Attack appeared first on SecurityWeek.
The cyberattack affected software of Collins Aerospace, whose systems help passengers check in, print boarding passes and bag tags, and dispatch their luggage.
The post Airport Cyberattack Disrupts More Flights Across Europe appeared first on SecurityWeek.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Salesloft Drift customers are compromised in a much more expansive downstream attack spree than previously thought, potentially ensnaring any user that integrated the AI chat agent platform to another service.
βWeβre telling organizations to treat any Drift integration into any platform as potentially compromised, so that increases the scope of victims,β Mandiant Consulting CTO Charles Carmakal told CyberScoop. This expanded attack radius includes Google Workspace customers that integrated Salesloft Drift into their instances. Victims have been notified that Google has found evidence of compromise.
Freshly uncovered evidence proves the threat actors, which Google tracks as UNC6395, didnβt just hit Salesforce customers who used Salesloft Drift, as Salesloft claimed Tuesday.Β
βThis just really blows wide open the scope here,β said Austin Larsen, principal threat analyst at Google Threat Intelligence Group.
Salesloft Drift provides integrations with 58 third-party tools for customer relationship management, automation, analytics, sales, communications and support, according to a third-party integration guide the vendor updated last month.
Salesloft updated its security blog to confirm that impact is much more severe and widespread. The company said itβs working with Mandiant, Google Cloudβs incident response division, and cyber insurer Coalition to assist in an ongoing investigation.
The sales engagement platform, a variant of CRM, is now recommending all Drift customers who manage connections to third-party applications via API key to revoke the existing key and rotate to a new key. Salesloft, which acquired Drift in February 2024, did not respond to a request for comment.Β
In response to the widening security incident, Salesforce said late Wednesday it disabled the connection between Drift and Salesforce, rendering those integrations defunct. Salesforce declined to answer questions and maintains the issue does not involve a vulnerability in the Salesforce platform.
While the number of victims has grown, Google is sticking to the estimates it shared Tuesday, reiterating that more than 700 organizations are potentially impacted. Yet, itβs clear researchers are still working to identify all potential paths of compromise.Β
βWeβve seen evidence of other platforms that were impacted as well,β Carmakal said.
The exposure could also involve former Drift customers. Mandiant identified one victim that may have been a former Drift customer, but researchers are still working to confirm those details.Β
GTIG said the financially motivated threat group UNC6395 has also retrieved OAuth tokens for multiple services, including some that allowed it to βaccess email from a very small number of Google Workspace accounts.β The attackers primarily sought to steal credentials to compromise other systems connected to initial victims, as it specifically searched for Amazon Web Services access keys, virtual private network credentials and Snowflake credentials.
The root cause of the attacks, specifically how UNC6395 gained initial access to Salesloft Drift, remains unconfirmed. Researchers are also working to determine the full extent of the compromise within Salesloft Driftβs infrastructure.
βWe are working with Salesloft Drift to investigate the root cause of what occurred and then itβll be up to them to publish that,β Carmakal said. βThere will be a lot more tomorrow, and the next day, and the next day.β
The post Salesloft Drift compromised en masse, impacting all third-party integrations appeared first on CyberScoop.
Read more of this story at Slashdot.
Read more of this story at Slashdot.