Hacker used $35 computer to steal NASA data

Stealing sensitive data and forcing the temporary disconnection of space-flight systems


Afp June 25, 2019
The criminals sold fake currency to Pakistani citizens in the name of easy-to-earn profit. PHOTO: AFP

WASHINGTON: A hacker used a tiny Raspberry Pi computer to infiltrate NASA's Jet Propulsion Laboratory network, stealing sensitive data and forcing the temporary disconnection of space-flight systems, the agency has revealed.

The April 2018 attack went undetected for nearly a year, according to an audit report issued on June 18, and an investigation is still underway to find the culprit.

A Raspberry Pi is a credit-card sized device sold for about $35 that plugs into home televisions and is used mainly to teach coding to children and promote computing in developing countries.

Database exposes millions of Instagram account information

Prior to detection, the attacker was able to exfiltrate 23 files amounting to approximately 500 megabytes of data, the report from NASA's Office of Inspector General said.

These included two restricted files from the Mars Science Laboratory mission, which handles the Curiosity Rover, and information relating to the International Traffic in Arms Regulations which restrict the export of US defence and military technologies.

"More importantly, the attacker successfully accessed two of the three primary JPL networks," the report said.

"Officials were concerned the cyberattackers could move laterally from the gateway into their mission systems, potentially gaining access and initiating malicious signals to human space flight missions that use those systems."

Yahoo says all 3 billion accounts hacked in 2013 data theft

NASA came to question the integrity of its Deep Space Network data "and temporarily disconnected several space flight-related systems from the JPL network."

The breach came about as a result of a system administrator failing to update the database that determines which devices have access to the network. As a result, new devices could be added without proper vetting.

In response to the attack, the JPL "installed additional monitoring agents on its firewalls" and was reviewing network access agreements with its external partners, the report said.

 

 

COMMENTS

Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ