• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 

Microsoft issues emergency patches for SharePoint zero-days exploited in "ToolShell" attacks

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Hack Satellite Connection and Surf Anonymously with High-speed Internet

Hack Satellite Connection and Surf Anonymously with High-speed Internet

Pierluigi Paganini August 13, 2015

A Spanish-based security analyst demonstrated new satellite capturing traps that could allow to surf anonymously with High-speed Internet.

Digital signals can be conveyed to certain places by satellites where the Internet appears like a wonder: off-the-network desert sunlight based homesteads, the Arctic or a plane carrying warship adrift. Be that as it may, in radiating information to and from the world’s most remote spots, satellite Internet might likewise offer its signals to a less generous beneficiary: any advanced scoundrel inside of a large number of miles.

In a presentation at the Black Hat security gathering in Arlington, Va., Tuesday, Spanish cybersecurity specialist Leonardo Nve introduced a mixed bag of traps for obtaining entrance to and abusing satellite Internet associations. Utilizing not even exactly $75 as a part of devices, Nve, a scientist with security firm S21Sec, says that he can catch Digital Video Broadcast (DVB) signs to get free rapid (extremely high speed) Internet.

satellite

Keeping in mind that is not an especially new trick – hackers have long possessed the capacity to capture satellite TV or other sky-borne signals–Nve likewise went above and beyond, depicting how he found himself able to utilize satellite single waves to anonymize his Internet, get entrance to private systems and even block satellite Internet clients’ solicitations for Web pages and supplant them with ridiculed sites.

Nve said, “What’s interesting about this is that it’s very, very easy”. “Anyone can do it: phishers or Chinese hackers … it’s like a very big Wi-Fi network that’s easy to access”, the researcher added.

In an entrance test on a customer’s system, Nve utilized a Skystar 2 PCI satellite collector card, a bit of equipment that can be purchased on eBay ( EBAY – news – individuals ) for 30 USD or even less, alongside open source Linux DVB programming applications and the system information investigation or “sniffing” program Wireshark.

Abusing that signal wave, Nve says he found himself able to mimic any client associating with the Internet by means of satellite, viably making a fast, untraceable mysterious Internet connection that can be utilized for loathsome online exercises.

Nve likewise turned around the trap, imitating Web destinations that a satellite client is intercepting so as to end to visit a Domain Name System (DNS) request–a demand for an Internet administration supplier (aka ISP) to change over a spelled out website name into the numerical IP address where it’s stored–and sending back an answer quicker than the ISP. That permits him to supplant a webpage that the target explores to straightforwardly with a website of his picking, making the potential for imperceptible cybercrime locales that take passwords or introduces malignant programming.

In his tests on the target’s system, Nve says he was additionally all good to capture signs utilizing GRE or TCP conventions that endeavors utilization to impart in the middle of PCs and servers or between workplaces, utilizing the connections for obtaining entrance to an organization or government office’s neighborhood.

The Barcelona-based security specialist tried his techniques with respect to geosynchronous satellites targeted at Europe, Africa and South America. Yet, he says there’s little uncertainty that the same traps would take a shot at satellites confronting North America or any other place.

What makes his assaults conceivable, Nve says, is that DVB digital signs are normally left decoded. That absence of straightforward security, he says, comes from the logistical and lawful difficulties of scrambling the signals, which may make it harder to share information among organizations or offices and–given that a satellite signal wave spreads to numerous countries–could keep running into formality encompassing worldwide utilization of cryptography. “Each [country] can surely have its own particular law for crypto,” says Nve. “It’s less demanding not to have encryption at the DVB layer.”

Nve isn’t the first to demonstrate the defenselessness of satellite connections that are believed to be secure. John Walker, a British satellite aficionado, told the BBC in 2002 that he could watch decoded NATO feature sustains from observation fights in the Balkans. What’s more, the same absence of encryption permitted radicals to hack into the feature food of unmanned U.S. automaton planes scouting Afghanistan, the Wall Street Journal reported back in December.

Truth be told, the tricks that Nve showed are likely known to satellite programmers however never promoted, says Jim Geovedi, a satellite security scientist and expert with the firm Bellua in Indonesia. He contrasts satellite hacking with right on time telephone hacking or “phreaking,” a practice that is not all around ensured against but rather performed by just a little number of individuals around the world. “This satellite hacking thing is still considered blackbox learning,” he wrote in an email to Forbes. “I accept there are numerous individuals out there who conduct comparative exploration. They may have some cool traps however have kept them mystery for a long time.”

Finally year’s Black Hat D.C. gathering, British cybersecurity analyst Adam Laurie exhibited how he blocks satellite signal waves with systems like Nve, utilizing a DreamBox satellite collector and Wireshark. However, Nve contends that his strategy is far cheaper–Laurie’s DreamBox setup costs around $750–and that he’s the first to show satellite signal commandeering (Hijacking in simple words) as opposed to just interception.

Written by: Ali Qamar, Founder/Chief Editor at SecurityGladiators.com

Author Bio:
Ali Qamar is an Internet security research enthusiast who enjoys “deep” research to dig out modern discoveries in the security industry. He is the founder and chief editor at Security Gladiators, an ultimate source for cyber security. To be frank and honest, Ali started working online as a freelancer and still shares the knowledge for a living. He is passionate about sharing the knowledge with people, and always try to give only the best. Follow Ali on Twitter @AliQammar57

Pierluigi Paganini

(Security Affairs – Satellite, hacking)


facebook linkedin twitter

you might also like

Pierluigi Paganini July 25, 2025
Operation CargoTalon targets Russia’s aerospace with EAGLET malware,
Read more
Pierluigi Paganini July 25, 2025
Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

    Security / July 25, 2025

    Koske, a new AI-Generated Linux malware appears in the threat landscape

    Malware / July 25, 2025

    Mitel patches critical MiVoice MX-ONE Auth bypass flaw

    Security / July 25, 2025

    Coyote malware is first-ever malware abusing Windows UI Automation

    Malware / July 24, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT