Tuesday, January 21, 2025
HomeHacksResearchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

Researchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

Published on

SIEM as a Service

Follow Us on Google News

In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink satellite-based internet system operated by SpaceX was successfully hacked. 

The most shocking thing is that it cost him approx 25 dollars only to make a homemade circuit board to hack the system.

A series of hardware vulnerabilities have allowed hackers to gain access to the Starlink system, allowing them to run custom code on the devices and gain control over the Starlink system. 

During the Black Hat security conference, security analyst Wouters will briefly unveil all the key details.

As part of the process of designing the modchip, Wouters created a layout that fits over the existing Starlink board, based on the scanning of the Starlink dish. By soldering the modchip directly to the Starlink PCB, he was able to connect it to the existing Starlink PCB.

This kit includes the following components:-

  • Raspberry Pi microcontroller
  • Flash storage
  • Electronic switches
  • Voltage regulator

The tool also launched a fault injection attack on the Starlink dish once it was attached, which led to a temporary short of the system as a result. Consequently, Wouters was able to bypass Starlink’s security measures in order to gain access to the system’s locked areas.

Wouters’ attack took advantage of an error in the bootloader and ran the glitch on this bootloader. Afterward, he deployed patched firmware that enabled him to control the dish by using later bootloaders.

Inference

The launch of more than 3,000 small satellites since 2018 has already provided Internet access to locations that terrestrial networks cannot reach and haven’t been able to reach for many years.

As more and more satellites are launched, the security of their operation will become more and more important. Since satellite internet systems have already been targeted by malicious hackers.

During Russian troops’ entry into Ukraine, Russia attacked a satellite that provides internet communications all over Europe. It has been estimated that about 30,000 internet connections have been disrupted throughout Europe. 

Even the tide effects of this event were felt in other critical infrastructures as well as the aviation navigation systems.

The researcher notified Starlink of the flaws last year and the company paid Wouters through its bug bounty scheme for identifying the vulnerabilities. 

This is what Starlink reiterates:-

As the attack requires physical access to the user terminal, it emphasizes that it is only affecting a single device and not the entire system that was compromised due to the glitching process. Starlink’s overall system, which includes a wide range of systems, is not affected by this issue.

Also Read: The Rise of Remote Workers: A Checklist for Securing Your Network – Downloads Free E-Book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

Critical SUSE Linux Distro Injection Vulnerability Allow Attackers Exploits “go-git” Library

A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Casio Hacked – Servers Compromised by a Ransomware Attack

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were...

AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles

AT&T and Verizon Communications, two of America's largest telecommunications providers, have confirmed they were...