Monday, December 16, 2024
HomeCyber AttackNASA Hacked Through an Unauthorized Raspberry Pi Computer Connected to the NASA...

NASA Hacked Through an Unauthorized Raspberry Pi Computer Connected to the NASA Servers

Published on

SIEM as a Service

NASA confirmed that hackers gained access to the Jet Propulsion Laboratory (JPL) last year and they able to steal 500MB of data that related to Mars missions. The hackers breached into NASA network in April 2018 and intrusion remains undetected nearly for a year.

According to the OIG report, an Unauthorized Raspberry Pi Computer Connected to the JPL Servers without security audit allows the hackers to gain access to the network, and they moved further into the network.

In total attackers have stolen 23 files, out of the 2 files are most confidential ones that contain information about International Traffic in Arms Regulations and Mars Science Laboratory Mission.

- Advertisement - SIEM as a Service

The report states that system administrators failed to update the inventory when the new devices are attached to the network that shared with External Partners to access the JPL network gateway.

The network gateway allows external users and partners, including foreign space agencies, contractors, and educational institutions, remote access to a shared environment for specific missions and data.

JPL failed to limit the partner users to access only to the authorized systems and applications, which allows an attacker to explore further into the network. If there is a boundary specified the attacker cannot bypass it.

“The cyberattacker from the April 2018 incident exploited the JPL network’s lack of segmentation to move between various systems connected to the gateway, including multiple JPL mission operations and the DSN.”

Also, the report indicates that system administrators failed to review the system and application logs due to the misunderstanding of responsibilities in place, allows the attackers to stay undetected for nearly a year.

“JPL uses its Information Technology Security Database (ITSDB) to track and manage physical assets and applications on its network; however, we found the database inventory incomplete and inaccurate, placing at risk JPL’s ability to monitor, report effectively, and respond to security incidents.”

“NIST recommends that organizations conduct periodic reviews of processes and procedures to ensure effective log management for detecting threats in their IT environment.”

This is not the first hackers gained access to the NASA system; here are some notable attacks.

2009 – An attacker penetrated to JPL systems and extracted 22 gigabytes of data.
2011 – China-based IP address gained access to servers supporting JPL missions.
2014 – Vulnerability detected by JPL that allows an attacker to inject malware.
2016 – Website misconfiguration allows an anonymous user to gain access with elevated privileges.
2017 – Hackers Exploited spacecraft server by exploiting a zero-day.

Follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep your self-updated.

NASA Hacked – Hackers Compromised NASA Servers & Personal Data May have been Stolen

Italian Police Finally Identified 25-Year-old Italian Hacker who has Defaced NASA Websites

Chinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack on NASA

NASA Data Leak – Internal App Leaked NASA Staff and Project Sensitive data

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams...

“Password Era is Ending,” Microsoft to Delete 1 Billion Passwords

Microsoft has announced that it is currently blocking an astounding 7,000 password attacks every...

Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit

The research identified vulnerabilities in Prometheus, including information disclosure from exposed servers, DoS risks...

Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Researchers discovered multiple vulnerabilities in Ruijie Networks' cloud-connected devices. By exploiting these vulnerabilities, attackers...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams...

“Password Era is Ending,” Microsoft to Delete 1 Billion Passwords

Microsoft has announced that it is currently blocking an astounding 7,000 password attacks every...

Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit

The research identified vulnerabilities in Prometheus, including information disclosure from exposed servers, DoS risks...