Risk
5/20/2011
02:05 PM
50%
50%

Hacker Exposes NASA Security Hole

A Goddard Space Flight Center FTP server was breached by a Romanian whitehat hacker known as TinKode, who cracked a European Space Agency network a month ago.

NASA, Microsoft Reveal Mars In Pictures
(click image for larger view)
Slideshow: NASA, Microsoft Reveal Mars In Pictures
A Romanian hacker exposed a security flaw in the servers of NASA's Goddard Space Flight Center, posting proof of his intrusion online.

The hacker--who goes by the online name of TinKode--this week posted on his website a screenshot of the index of a directory from an FTP network at NASA facility in Maryland.

TinKode is known as a "whitehat" hacker who exposes security flaws of companies and government agencies so they will be aware of them and fix them, not for financial gain or to spread malware.

NASA Goddard News Chief Ed Campion confirmed the breach to a NASA Goddard FTP site in an emailed statement from NASA officials Friday, but declined to comment specifically about what has been done to patch the hole.

"The necessary steps were taken to protect our infrastructure at the time," officials said, adding that NASA does not discuss details of its IT security but "remains vigilant" to protect its websites.

In an email interview with InformationWeek, TinKode on Friday declined to disclose the kind of security flaw he found in the NASA network, but said he had seen it before. He added that the agency so far has not contacted him about the breach.

TinKode explained in a blog post that it was "very hard" to breach the NASA network, but he was able to do it because "the webserver had good protection but wasn't fully secured." He added that it was only possible to infiltrate the network manually, not with applications.

The exposure of the flaw is not the first time TinKode has turned his attention to a space agency. Exactly a month before the NASA post, he posted information about a breach of a network at the European Space Agency. That post included links providing information about the server and accounts that were breached.

In the new, all-digital issue of InformationWeek: Our 2011 Strategic Security Survey shows increased executive interest in security. Here's what you should do next. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7266
Published: 2015-02-01
Algorithmic complexity vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x through 3.1.2 allows remote attackers to cause a denial of service (CPU consumption) via vectors that trigger colliding hash-table keys. NOTE: this vulnerability exists because of an incomplete fix for CVE-2...

CVE-2014-7269
Published: 2015-02-01
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376....

CVE-2014-7270
Published: 2015-02-01
Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earl...

CVE-2014-8630
Published: 2015-02-01
Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shel...

CVE-2014-9200
Published: 2015-02-01
Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X8...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.