Friday, November 15, 2024
HomeHacksResearchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

Researchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

Published on

In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink satellite-based internet system operated by SpaceX was successfully hacked. 

The most shocking thing is that it cost him approx 25 dollars only to make a homemade circuit board to hack the system.

A series of hardware vulnerabilities have allowed hackers to gain access to the Starlink system, allowing them to run custom code on the devices and gain control over the Starlink system. 

- Advertisement - SIEM as a Service

During the Black Hat security conference, security analyst Wouters will briefly unveil all the key details.

As part of the process of designing the modchip, Wouters created a layout that fits over the existing Starlink board, based on the scanning of the Starlink dish. By soldering the modchip directly to the Starlink PCB, he was able to connect it to the existing Starlink PCB.

This kit includes the following components:-

  • Raspberry Pi microcontroller
  • Flash storage
  • Electronic switches
  • Voltage regulator

The tool also launched a fault injection attack on the Starlink dish once it was attached, which led to a temporary short of the system as a result. Consequently, Wouters was able to bypass Starlink’s security measures in order to gain access to the system’s locked areas.

Wouters’ attack took advantage of an error in the bootloader and ran the glitch on this bootloader. Afterward, he deployed patched firmware that enabled him to control the dish by using later bootloaders.

Inference

The launch of more than 3,000 small satellites since 2018 has already provided Internet access to locations that terrestrial networks cannot reach and haven’t been able to reach for many years.

As more and more satellites are launched, the security of their operation will become more and more important. Since satellite internet systems have already been targeted by malicious hackers.

During Russian troops’ entry into Ukraine, Russia attacked a satellite that provides internet communications all over Europe. It has been estimated that about 30,000 internet connections have been disrupted throughout Europe. 

Even the tide effects of this event were felt in other critical infrastructures as well as the aviation navigation systems.

The researcher notified Starlink of the flaws last year and the company paid Wouters through its bug bounty scheme for identifying the vulnerabilities. 

This is what Starlink reiterates:-

As the attack requires physical access to the user terminal, it emphasizes that it is only affecting a single device and not the entire system that was compromised due to the glitching process. Starlink’s overall system, which includes a wide range of systems, is not affected by this issue.

Also Read: The Rise of Remote Workers: A Checklist for Securing Your Network – Downloads Free E-Book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...