Thursday, May 1, 2025
HomeCyber AttackNASA Hacked Through an Unauthorized Raspberry Pi Computer Connected to the NASA...

NASA Hacked Through an Unauthorized Raspberry Pi Computer Connected to the NASA Servers

Published on

SIEM as a Service

Follow Us on Google News

NASA confirmed that hackers gained access to the Jet Propulsion Laboratory (JPL) last year and they able to steal 500MB of data that related to Mars missions. The hackers breached into NASA network in April 2018 and intrusion remains undetected nearly for a year.

According to the OIG report, an Unauthorized Raspberry Pi Computer Connected to the JPL Servers without security audit allows the hackers to gain access to the network, and they moved further into the network.

In total attackers have stolen 23 files, out of the 2 files are most confidential ones that contain information about International Traffic in Arms Regulations and Mars Science Laboratory Mission.

- Advertisement - Google News

The report states that system administrators failed to update the inventory when the new devices are attached to the network that shared with External Partners to access the JPL network gateway.

The network gateway allows external users and partners, including foreign space agencies, contractors, and educational institutions, remote access to a shared environment for specific missions and data.

JPL failed to limit the partner users to access only to the authorized systems and applications, which allows an attacker to explore further into the network. If there is a boundary specified the attacker cannot bypass it.

“The cyberattacker from the April 2018 incident exploited the JPL network’s lack of segmentation to move between various systems connected to the gateway, including multiple JPL mission operations and the DSN.”

Also, the report indicates that system administrators failed to review the system and application logs due to the misunderstanding of responsibilities in place, allows the attackers to stay undetected for nearly a year.

“JPL uses its Information Technology Security Database (ITSDB) to track and manage physical assets and applications on its network; however, we found the database inventory incomplete and inaccurate, placing at risk JPL’s ability to monitor, report effectively, and respond to security incidents.”

“NIST recommends that organizations conduct periodic reviews of processes and procedures to ensure effective log management for detecting threats in their IT environment.”

This is not the first hackers gained access to the NASA system; here are some notable attacks.

2009 – An attacker penetrated to JPL systems and extracted 22 gigabytes of data.
2011 – China-based IP address gained access to servers supporting JPL missions.
2014 – Vulnerability detected by JPL that allows an attacker to inject malware.
2016 – Website misconfiguration allows an anonymous user to gain access with elevated privileges.
2017 – Hackers Exploited spacecraft server by exploiting a zero-day.

Follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep your self-updated.

NASA Hacked – Hackers Compromised NASA Servers & Personal Data May have been Stolen

Italian Police Finally Identified 25-Year-old Italian Hacker who has Defaced NASA Websites

Chinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack on NASA

NASA Data Leak – Internal App Leaked NASA Staff and Project Sensitive data

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Managing Shadow IT Risks – CISO’s Practical Toolkit

Managing Shadow IT risks has become a critical challenge for Chief Information Security Officers...

Application Security in 2025 – CISO’s Priority Guide

Application security in 2025 has become a defining concern for every Chief Information Security...

Preparing for Quantum Cybersecurity Risks – CISO Insights

Quantum cybersecurity risks represent a paradigm shift in cybersecurity, demanding immediate attention from Chief...

Securing Digital Transformation – CISO’s Resource Hub

In today’s hyper-connected world, securing digital transformation is a technological upgrade and a fundamental...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Netgear EX6200 Flaw Enables Remote Access and Data Theft

Security researchers have disclosed three critical vulnerabilities in the Netgear EX6200 Wi-Fi range extender...

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code

A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own...

Apache ActiveMQ Vulnerability Lets Remote Hackers Execute Arbitrary Code

A high vulnerability in Apache ActiveMQ’s .NET Message Service (NMS) library has been uncovered,...