Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43441
  • Total Topics: 16533
  • Online today: 3127
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 3116
Total: 3117









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 21. April 2014., 17:57:34 »

Actually... I mostly was referring to Hollywood...

...

I was confused... :P
Posted by: devnullius
« on: 20. April 2014., 12:53:55 »

Actually... I mostly was referring to Hollywood - all movies tell you already how bad everything is secured once it became orbital ;p

Hence the reference to this great 80s movie: War Games. Even the book of the movie is fun to read :)

Devvie
Posted by: Samker
« on: 20. April 2014., 08:51:45 »

This is old news...

...

Really, I found only this Topic ("similar") at SCforum - "Hackers plans to put their own satellites into orbit": http://scforum.info/index.php/topic,7347.0.html
Posted by: devnullius
« on: 19. April 2014., 22:39:39 »

This is old news...

Posted by: Samker
« on: 19. April 2014., 08:20:04 »



Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.

Between October and December last year, researchers from IOActive analyzed the firmware of popular satellite communications (SATCOM) devices that are used in the military, aerospace, maritime, critical infrastructure and other sectors. The research covered products manufactured or marketed by Harris, Hughes Network Systems, Cobham, Thuraya Telecommunications, Japan Radio Company (JRC) and Iridium Communications. The analysis focused on SATCOM terminals that are used on ground, in the air and at sea, not satellite communications equipment in space.

“IOActive found that all devices within the scope of this research could be abused by a malicious actor,” the IOActive researchers said in a report published Thursday. “We uncovered what would appear to be multiple backdoors, hardcoded credentials, undocumented and/or insecure protocols, and weak encryption algorithms”: http://www.ioactive.com/pdfs/IOActive_SATCOM_Security_WhitePaper.pdf

“These vulnerabilities allow remote, unauthenticated attackers to compromise the affected products,” the researchers said. “In certain cases no user interaction is required to exploit the vulnerability; just sending a simple SMS or specially crafted message from one ship to another ship would be successful for some of the SATCOM systems.”

For example, vulnerabilities that IOActive claims to have found in mobile Harris BGAN terminals would allow attackers to install malicious firmware or execute arbitrary code. Such terminals may be used by the military to coordinate attacks between different units and are common within the forces of the North Atlantic Treaty Organization (NATO), the researchers said.

In an attack scenario described by the IOActive team, malware running on a laptop connected to a BGAN terminal could inject malicious code into the device that would use its GPS to monitor its geographic location.

“This would allow the attacker to compare the systems position with a fixed area (target zone) where an attack from enemy forces is planned,” the researchers said. The code could then disable communications from the device when it enters the target zone, hindering the ability to call for support or organize a counter-attack, the researchers said.

The Hughes BGAN M2M terminals, which are used in the utilities, oil and gas, retail banking and environment monitoring sectors, also contain vulnerabilities that could allow attackers to perform fraud, launch denial-of-service attacks, cause physical damage and spoof data, according to IOActive. These satellite user terminals can be controlled remotely via SMS messages, the company’s researchers said.

IOActive also claims to have identified vulnerabilities in marine VSAT and FB terminals from Cobham, like Cobham SAILOR 900 VSAT, Cobham Sailor FB and JRC JUE-250/500 FB, that could give attackers full control over communications passing through a ship’s satellite link. This link is used for a variety of services including telephone, broadband Internet, email and file transfer, video conferencing, weather forecasts, maritime/port regulations, vessel routing, cargo management and emergency communications.

Another Cobham satellite communications suite for vessels called Cobham SAILOR 6000 uses an insecure thraneLINK protocol that can be used by attackers to take full control of the suite, the IOActive researchers said. Cobham SAILOR 6000 handles Global Maritime Distress and Safety System (GMDSS) communications which includes transmitting or receiving ship-to-shore, shore-to-ship and ship-to-ship distress alerts; as well as rescue coordinating communications; on-scene communications; signals for localization and maritime safety information among other things.

Compromising the Cobham SAILOR 6000 communications suite poses a critical threat to the ship’s safety, the researchers said.

According to IOActive, another vulnerable satellite communications system is Cobham AVIATOR 700, which is used on aircraft, including military craft. The system is available in two versions certified for the lowest levels of risk that their failure might pose to the aircraft, crew and passengers—levels E (no effect) and D (minor).

“IOActive was able to demonstrate that it is possible to compromise a system certified for level D that interacts with devices certified for level A [catastrophic risk], potentially putting the level A devices integrity at risk,” the researchers said.

“More specifically, a successful attack could compromise control of the satellite link channel used by the Future Air Navigation System (FANS), Controller Pilot Data Link Communications (CPDLC) or Aircraft Communications Addressing and Reporting System (ACARS),” the researchers said. “A malfunction of these subsystems could pose a safety threat for the entire aircraft.”

The published paper does not contain any technical details about the identified flaws in order to avoid their exploitation by malicious parties. However, the researchers plan to release such details later this year.

IOActive claims that it worked with the CERT Coordination Center (CERT/CC) to alert affected vendors about the vulnerabilities in their products.

“Unfortunately, except for Iridium, the vendors did not engage in addressing this situation,” the researchers said. “They did not respond to a series of requests sent by the CERT Coordination Center and/or its partners.”

The team recommends that SATCOM terminals manufacturers and resellers remove publicly accessible copies of the device firmware updates from their websites and strictly control access to such software in the future in order to prevent others from identifying the same or other vulnerabilities.

“If one of these affected devices can be compromised, the entire SATCOM infrastructure could be at risk,” the researchers said. “Ships, aircraft, military personnel, emergency services, media services, and industrial facilities (oil rigs, gas pipelines, water treatment plants, wind turbines, substations, etc.) could all be impacted by these vulnerabilities.”

“Iridium has been in contact with CERT since they brought these concerns to our attention and we have taken the necessary steps in the Iridium network to alleviate the issue,” Iridium Communications said in an emailed statement. “After extensive research internally, we have determined that the risk to Iridium subscribers is minimal, but we are taking precautionary measures to safeguard our users.”

Harris, Hughes Network Systems, Cobham, Thuraya Telecommunications, JRC did not immediately respond to requests for comment on Friday.

(PCW)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023