Hackers use Raspberry PI computer to steal 500 MB of NASA important data
In April 2018, NASA discovered an account belonging to an external user who had compromised the network in the Jet Propulsion Labortary (JBL) Laboratory and stole about 500 MB of data related to the programs of This space agency. Even hackers have violated JBL for 10 months without being detected, causing other serious consequences.
It is worth mentioning that hackers only use a cheap Raspberry PI computer to perform this intrusion.
Raspberry PI is one of the simplest, most stable computing platforms on the market and is very affordable, about 36USD. These computers are very compact in size, just by credit card, so it is very suitable for projects like antique gaming machines or smart home appliances. This is the first time a Raspberry PI has been exploited by hackers as a tool for a cyber attack.
Hackers used a Raspberry PI to gain illegal access to the JPL network. Hackers took advantage of the weaknesses in the lab's network to hide and avoid detection in 10 months. During that time, the bad guys stole 23 data files, including two files containing information about capital controlling technology transfer activities related to space and military, related to the Project. the Mars Science Laboratory Project, International Traffic in Arms Regulations.
NASA inspectors discovered vulnerabilities in JPL's network. Specifically, any user on the JPL network can access the system and the application they are not authorized to access. Meanwhile, system administrators cannot track devices that are participating in the network. Hackers took advantage of these loopholes to dive into the system and hide in it for a long time without being detected.
The intrusion caused the Johnson Space Center, which is responsible for the ISS space station, to disconnect from the portal in fear of hackers being able to access the mission systems and send them. Malicious signals to employees in these space missions.
Hackers have long been watching NASA and their labs because they contain research projects and patents for cutting-edge technologies.
You should read it
- NASA is about to announce the discovery of aliens?
- What is SS7 attack? What can hackers use it for?
- Explore the universe through 5 NASA websites
- Vietnam Hacker forum was paralyzed
- Prepare the total force to respond to DDoS attacks in 2014
- 17 skills needed to become a hacker
- Russian Hacker performs a new attack tactic
- Microsoft: There is a big hacker organization trying to sabotage the 2020 Olympics
- See the wild magnetic threads NASA found woven into the sun's atmosphere
- White-haired 'monsters'
- More than 1,300 phishing kits are being sold on the hacker forum
- Here's your chance to design a NASA payload for a Roomba-sized moon rover
Maybe you are interested
Why Most Good Hackers Come From Russia
5 common methods hackers use to hack bank accounts
What can hackers actually do if they gain access to your Wi-Fi router?
Hackers can attack robot vacuum cleaners and freely observe your home
Google increases the reward by 5 times for hackers who discover security errors in its services
Has OpenAI had data about AI technology stolen by hackers in 2023?