Tuesday, October 15, 2024
HomeCyber AttackNASA Hacked Through an Unauthorized Raspberry Pi Computer Connected to the NASA...

NASA Hacked Through an Unauthorized Raspberry Pi Computer Connected to the NASA Servers

Published on

Malware protection

NASA confirmed that hackers gained access to the Jet Propulsion Laboratory (JPL) last year and they able to steal 500MB of data that related to Mars missions. The hackers breached into NASA network in April 2018 and intrusion remains undetected nearly for a year.

According to the OIG report, an Unauthorized Raspberry Pi Computer Connected to the JPL Servers without security audit allows the hackers to gain access to the network, and they moved further into the network.

In total attackers have stolen 23 files, out of the 2 files are most confidential ones that contain information about International Traffic in Arms Regulations and Mars Science Laboratory Mission.

- Advertisement - SIEM as a Service

The report states that system administrators failed to update the inventory when the new devices are attached to the network that shared with External Partners to access the JPL network gateway.

The network gateway allows external users and partners, including foreign space agencies, contractors, and educational institutions, remote access to a shared environment for specific missions and data.

JPL failed to limit the partner users to access only to the authorized systems and applications, which allows an attacker to explore further into the network. If there is a boundary specified the attacker cannot bypass it.

“The cyberattacker from the April 2018 incident exploited the JPL network’s lack of segmentation to move between various systems connected to the gateway, including multiple JPL mission operations and the DSN.”

Also, the report indicates that system administrators failed to review the system and application logs due to the misunderstanding of responsibilities in place, allows the attackers to stay undetected for nearly a year.

“JPL uses its Information Technology Security Database (ITSDB) to track and manage physical assets and applications on its network; however, we found the database inventory incomplete and inaccurate, placing at risk JPL’s ability to monitor, report effectively, and respond to security incidents.”

“NIST recommends that organizations conduct periodic reviews of processes and procedures to ensure effective log management for detecting threats in their IT environment.”

This is not the first hackers gained access to the NASA system; here are some notable attacks.

2009 – An attacker penetrated to JPL systems and extracted 22 gigabytes of data.
2011 – China-based IP address gained access to servers supporting JPL missions.
2014 – Vulnerability detected by JPL that allows an attacker to inject malware.
2016 – Website misconfiguration allows an anonymous user to gain access with elevated privileges.
2017 – Hackers Exploited spacecraft server by exploiting a zero-day.

Follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep your self-updated.

NASA Hacked – Hackers Compromised NASA Servers & Personal Data May have been Stolen

Italian Police Finally Identified 25-Year-old Italian Hacker who has Defaced NASA Websites

Chinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack on NASA

NASA Data Leak – Internal App Leaked NASA Staff and Project Sensitive data

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

HORUS Protector Delivering AgentTesla, Remcos, Snake, NjRat Malware

The Horus Protector crypter is being used to distribute various malware families, including AgentTesla,...

ErrorFather Hackers Attacking & Control Android Device Remotely

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to...

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

HORUS Protector Delivering AgentTesla, Remcos, Snake, NjRat Malware

The Horus Protector crypter is being used to distribute various malware families, including AgentTesla,...

ErrorFather Hackers Attacking & Control Android Device Remotely

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to...

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...