• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 

A flaw in Catwatchful spyware exposed logins of +62,000 users

 | 

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 

Esse Health data breach impacted 263,000 individuals

 | 

Europol dismantles €460M crypto scam targeting 5,000 victims worldwide

 | 

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Hack Satellite Connection and Surf Anonymously with High-speed Internet

Hack Satellite Connection and Surf Anonymously with High-speed Internet

Pierluigi Paganini August 13, 2015

A Spanish-based security analyst demonstrated new satellite capturing traps that could allow to surf anonymously with High-speed Internet.

Digital signals can be conveyed to certain places by satellites where the Internet appears like a wonder: off-the-network desert sunlight based homesteads, the Arctic or a plane carrying warship adrift. Be that as it may, in radiating information to and from the world’s most remote spots, satellite Internet might likewise offer its signals to a less generous beneficiary: any advanced scoundrel inside of a large number of miles.

In a presentation at the Black Hat security gathering in Arlington, Va., Tuesday, Spanish cybersecurity specialist Leonardo Nve introduced a mixed bag of traps for obtaining entrance to and abusing satellite Internet associations. Utilizing not even exactly $75 as a part of devices, Nve, a scientist with security firm S21Sec, says that he can catch Digital Video Broadcast (DVB) signs to get free rapid (extremely high speed) Internet.

satellite

Keeping in mind that is not an especially new trick – hackers have long possessed the capacity to capture satellite TV or other sky-borne signals–Nve likewise went above and beyond, depicting how he found himself able to utilize satellite single waves to anonymize his Internet, get entrance to private systems and even block satellite Internet clients’ solicitations for Web pages and supplant them with ridiculed sites.

Nve said, “What’s interesting about this is that it’s very, very easy”. “Anyone can do it: phishers or Chinese hackers … it’s like a very big Wi-Fi network that’s easy to access”, the researcher added.

In an entrance test on a customer’s system, Nve utilized a Skystar 2 PCI satellite collector card, a bit of equipment that can be purchased on eBay ( EBAY – news – individuals ) for 30 USD or even less, alongside open source Linux DVB programming applications and the system information investigation or “sniffing” program Wireshark.

Abusing that signal wave, Nve says he found himself able to mimic any client associating with the Internet by means of satellite, viably making a fast, untraceable mysterious Internet connection that can be utilized for loathsome online exercises.

Nve likewise turned around the trap, imitating Web destinations that a satellite client is intercepting so as to end to visit a Domain Name System (DNS) request–a demand for an Internet administration supplier (aka ISP) to change over a spelled out website name into the numerical IP address where it’s stored–and sending back an answer quicker than the ISP. That permits him to supplant a webpage that the target explores to straightforwardly with a website of his picking, making the potential for imperceptible cybercrime locales that take passwords or introduces malignant programming.

In his tests on the target’s system, Nve says he was additionally all good to capture signs utilizing GRE or TCP conventions that endeavors utilization to impart in the middle of PCs and servers or between workplaces, utilizing the connections for obtaining entrance to an organization or government office’s neighborhood.

The Barcelona-based security specialist tried his techniques with respect to geosynchronous satellites targeted at Europe, Africa and South America. Yet, he says there’s little uncertainty that the same traps would take a shot at satellites confronting North America or any other place.

What makes his assaults conceivable, Nve says, is that DVB digital signs are normally left decoded. That absence of straightforward security, he says, comes from the logistical and lawful difficulties of scrambling the signals, which may make it harder to share information among organizations or offices and–given that a satellite signal wave spreads to numerous countries–could keep running into formality encompassing worldwide utilization of cryptography. “Each [country] can surely have its own particular law for crypto,” says Nve. “It’s less demanding not to have encryption at the DVB layer.”

Nve isn’t the first to demonstrate the defenselessness of satellite connections that are believed to be secure. John Walker, a British satellite aficionado, told the BBC in 2002 that he could watch decoded NATO feature sustains from observation fights in the Balkans. What’s more, the same absence of encryption permitted radicals to hack into the feature food of unmanned U.S. automaton planes scouting Afghanistan, the Wall Street Journal reported back in December.

Truth be told, the tricks that Nve showed are likely known to satellite programmers however never promoted, says Jim Geovedi, a satellite security scientist and expert with the firm Bellua in Indonesia. He contrasts satellite hacking with right on time telephone hacking or “phreaking,” a practice that is not all around ensured against but rather performed by just a little number of individuals around the world. “This satellite hacking thing is still considered blackbox learning,” he wrote in an email to Forbes. “I accept there are numerous individuals out there who conduct comparative exploration. They may have some cool traps however have kept them mystery for a long time.”

Finally year’s Black Hat D.C. gathering, British cybersecurity analyst Adam Laurie exhibited how he blocks satellite signal waves with systems like Nve, utilizing a DreamBox satellite collector and Wireshark. However, Nve contends that his strategy is far cheaper–Laurie’s DreamBox setup costs around $750–and that he’s the first to show satellite signal commandeering (Hijacking in simple words) as opposed to just interception.

Written by: Ali Qamar, Founder/Chief Editor at SecurityGladiators.com

Author Bio:
Ali Qamar is an Internet security research enthusiast who enjoys “deep” research to dig out modern discoveries in the security industry. He is the founder and chief editor at Security Gladiators, an ultimate source for cyber security. To be frank and honest, Ali started working online as a freelancer and still shares the knowledge for a living. He is passionate about sharing the knowledge with people, and always try to give only the best. Follow Ali on Twitter @AliQammar57

Pierluigi Paganini

(Security Affairs – Satellite, hacking)


facebook linkedin twitter

you might also like

Pierluigi Paganini July 06, 2025
Hunters International ransomware gang shuts down and offers free decryption keys to all victims
Read more
Pierluigi Paganini July 06, 2025
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Hunters International ransomware gang shuts down and offers free decryption keys to all victims

    Cyber Crime / July 06, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

    Security / July 06, 2025

    Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 06, 2025

    North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

    Malware / July 05, 2025

    Critical Sudo bugs expose major Linux distros to local Root exploits

    Security / July 04, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT