Hackers use Raspberry PI computer to steal 500 MB of NASA important data
In April 2018, NASA discovered an account belonging to an external user who had compromised the network in the Jet Propulsion Labortary (JBL) Laboratory and stole about 500 MB of data related to the programs of This space agency. Even hackers have violated JBL for 10 months without being detected, causing other serious consequences.
It is worth mentioning that hackers only use a cheap Raspberry PI computer to perform this intrusion.
Raspberry PI is one of the simplest, most stable computing platforms on the market and is very affordable, about 36USD. These computers are very compact in size, just by credit card, so it is very suitable for projects like antique gaming machines or smart home appliances. This is the first time a Raspberry PI has been exploited by hackers as a tool for a cyber attack.
Hackers used a Raspberry PI to gain illegal access to the JPL network. Hackers took advantage of the weaknesses in the lab's network to hide and avoid detection in 10 months. During that time, the bad guys stole 23 data files, including two files containing information about capital controlling technology transfer activities related to space and military, related to the Project. the Mars Science Laboratory Project, International Traffic in Arms Regulations.

NASA inspectors discovered vulnerabilities in JPL's network. Specifically, any user on the JPL network can access the system and the application they are not authorized to access. Meanwhile, system administrators cannot track devices that are participating in the network. Hackers took advantage of these loopholes to dive into the system and hide in it for a long time without being detected.
The intrusion caused the Johnson Space Center, which is responsible for the ISS space station, to disconnect from the portal in fear of hackers being able to access the mission systems and send them. Malicious signals to employees in these space missions.
Hackers have long been watching NASA and their labs because they contain research projects and patents for cutting-edge technologies.
You should read it
- Explore the universe through 5 NASA websites
- Vietnam Hacker forum was paralyzed
- Prepare the total force to respond to DDoS attacks in 2014
- 17 skills needed to become a hacker
- Russian Hacker performs a new attack tactic
- Microsoft: There is a big hacker organization trying to sabotage the 2020 Olympics
- See the wild magnetic threads NASA found woven into the sun's atmosphere
- White-haired 'monsters'
May be interested
- The Raspberry Pi 4 has errors in the board design, cannot work with USB-C cables that are 'electronically marked'.in the circuit of the raspberry pi 4, there is a lack of a resistor, an important component that helps identify the current between the raspberry pi 4 and accessories (including the charging cable).
- Raspberry Pi 4 officially launched, quad-core Cortex-A72 1.5 GHz, maximum RAM of 4GBafter the last days of waiting, the raspberry pi 4 computer has officially been released with many improvements and significant improvements compared to the raspberry pi 3.
- How to send backup copies of Raspberry Pi files to emaillike any other computer system, raspberry pi is not immune to hardware failures, data loss, and many other problems.
- How to turn off Java to improve securitythe us department of homeland security has just advised internet users to turn off java on their browsers. the reason given is that a lot of vulnerabilities in this tool can cause hackers to steal important information.
- How to add an ADC to Raspberry Pi: What you need to knowraspberry pi lacks analog input. this puts it at a disadvantage compared to microcontroller-based boards like the arduino.
- Super hackers steal tens of millions of credit card datain the biggest bank card theft in the united states, 28-year-old hackers were fined $ 2.7 million and have the ability to 'peel off the calendar' for decades in prison.
- Raspberry Pi Zero vs Model A and B, how are they different?you want to buy a raspberry pi, but when you search, you have a problem: why are there so many raspberry pi models? although all of the different raspberry pi can do many similar tasks, there are tasks that specific boards will be more suitable for.
- Test your understanding of P2 hackthe network administrator's quiz below will help you gain the knowledge to start your career as a hacker. the question set has only 2 answers, you just need to answer right or wrong.
- The 13-year-old 'Hacker' enters the school's computer system to create a 'list of the most hated kids'recently, a 13-year-old 'young man' in the united states was investigated for allegedly illegally accessing and using personal data of a teacher, thereby breaking into the school's computer system to steal personal information of other students and create a blacklist of the most hated students in the school.
- 7 things you need to know about Raspberry Piwhat is a raspberry pi is a question that many technology lovers are interested in learning about. in the article below, tipsmake provides 7 important information related to this device.