Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/9/2018
09:45 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships

Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network - and other findings - at Black Hat USA today.

BLACK HAT USA – Las Vegas – Ruben Santamarta was flying from Madrid to Copenhagen in November 2017 on a Norwegian Airlines flight when he decided to inspect the plane's Wi-Fi network security. So he launched Wireshark from his laptop and began monitoring the network.

Santamarta noted "some weird things" happening. First off, his internal IP address was assigned a public, routable IP address, and then, more disconcerting, he suddenly noticed random network scans on his computer. It turned out the plane's satellite modem data unit, or MDU, was exposed and rigged with the Swordfish backdoor, and a router from a Gafgyt IoT botnet was reaching out to the satcom modem on the in-flight airplane, scanning for new bot recruits.

The Internet of Things (IoT) botnet code didn't appear to have infected any of the satcom terminals on that plane or others, according to Santamarta, but it demonstrated how exposed the equipment was to potential malware infections. "This botnet was not prepared to infect VxWorks. So, fortunately, it was no risk for the aircraft," he said.

That was one of the long-awaited details Santamarta, principal security consultant at IOActive, shared today of his research on how he was able to exploit vulnerabilities in popular satellite communications systems that he had first reported in 2014. The flaws – which include backdoors, insecure protocols, and network misconfigurations – in the equipment affect hundreds of commercial airplanes flown by Southwest, Norwegian, and Icelandair airlines. Satcom equipment used in the maritime industry and the military also are affected by the vulns.

Santamarta emphasized that while the vulnerabilities could allow hackers to remotely wrest control of an aircraft's in-flight Wi-Fi, there are no safety threats to airplanes with such attacks. The attack can't reach a plane's safety systems due to the way the networks are isolated and configured. But an attacker could access not only the in-flight Wi-Fi network, but also the personal devices of passengers and crew members.

He also found the flaws in satellite earth stations and antenna on ships and in earth stations used by the US military in conflict zones.

"It can disrupt, intercept, and modify" satcom operations from the ground, he said.

Meantime, in his research he also found a Mirai botnet-infected antenna control unit on a maritime vessel. "There's malware already infecting vessels," he said.

Santamarta also exposed some serious physical safety risks of radio frequency (RF) heating that could cause burns or other physical damage or injury, and found the US military had satcom equipment exposed on the Internet. "You could get their GPS position" in some conflict zones, he said, declining to divulge any vuln details until all of the sites are remediated.

Santamarta's research was a massive coordinated disclosure process involving the aviation industry, satellite equipment vendors, and other parties.

Jeffrey Troy, executive director of the Aviation-ISAC, said in a press event yesterday previewing Santamarta's presentation that Santamarta shared his research with aviation experts who specialize in satellite communications for aircraft. "Then he learned more from the industry about his research," Troy said.

Related Content:

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10100
PUBLISHED: 2019-07-16
NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43.
CVE-2019-10100
PUBLISHED: 2019-07-16
BigTree-CMS commit b2eff67e45b90ca26a62e971e8f0d5d0d70f23e6 and earlier is affected by: Improper Neutralization of Script-Related HTML Tags in a Web Page. The impact is: Any Javascript code can be executed. The component is: users management page. The attack vector is: Insert payload into users' pro...
CVE-2019-10100
PUBLISHED: 2019-07-16
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871...
CVE-2019-13612
PUBLISHED: 2019-07-16
MDaemon Email Server 19 skips SpamAssassin checks by default for e-mail messages larger than 2 MB (and limits checks to 10 MB even with special configuration), which is arguably inconsistent with currently popular message sizes. This might interfere with risk management for malicious e-mail, if a cu...
CVE-2019-10100
PUBLISHED: 2019-07-16
Zammad GmbH Zammad 2.3.0 and earlier is affected by: Cross Site Scripting (XSS) - CWE-80. The impact is: Execute java script code on users browser. The component is: web app. The attack vector is: the victim must open a ticket. The fixed version is: 2.3.1, 2.2.2 and 2.1.3.