The Hacking of Starlink Terminals Has Begun | WIRED
https://www.wired.com/story/starlink-internet-dish-hack/ Since 2018, Elon Musk’s Starlink has launched more than 3,000 small satellites into orbit. This satellite network beams internet connections to hard-to-reach locations on Earth and has been a vital source of connectivity during Russia’s war in Ukraine. Thousands more satellites are planned for launch as the industry booms. Now, like any emerging technology, those satellite components are being hacked. "Today, Lennert Wouters, a security researcher at the Belgian university KU Leuven, will reveal one of the first security breakdowns of Starlink’s user terminals, the satellite dishes (dubbed Dishy McFlatface) that are positioned on people’s homes and buildings. At the Black Hat security conference in Las Vegas, Wouters will detail how a series of hardware vulnerabilities allow attackers to access the Starlink system and run custom code on the devices. "To access the satellite dish’s software, Wouters physically stripped down a dish he purchased and created a custom hacking tool that can be attached to the Starlink dish. The hacking tool, a custom circuit board known as a modchip, uses off-the-shelf parts that cost around $25. Once attached to the Starlink dish, the homemade printed circuit board (PCB) is able to launch a fault injection attack—temporarily shorting the system—to help bypass Starlink’s security protections. This “glitch” allows Wouters to get into previously locked parts of the Starlink system."
On 8/11/22, jim bell <jdb10987@yahoo.com> wrote:
https://www.wired.com/story/starlink-internet-dish-hack/ ... allow attackers to access the Starlink system and run custom code on the devices.
Running code on some random manufacturer's HW is common. Snooping on others traffic, getting free and/or anon service, commandeering the satellite and/or network control plane... those are totally different. https://www.youtube.com/watch?v=yYgiAHnyCak
participants (2)
-
grarpamp
-
jim bell