Security researcher Ruben Santamarta has claimed it is possible to compromise the internal systems of ships and aircraft, including passenger planes, using the vulnerabilities in on-board satellite broadband communications equipment.
Santamarta says he analysed hardware from leading Satellite Communications (SATCOM) vendors and found that “100 percent of the devices could be abused”.
The researcher will demonstrate his reverse-engineering techniques at the Black Hat USA conference in Las Vegas later this week. He told Reuters he hopes the presentation will serve as a wake-up call for the industry.
“These devices are wide open. The goal of this talk is to help change that situation,” said Santamarta.
For this year’s Black Hat, he started with something a bit more modest: after reverse-engineering popular SATCOM firmware from manufacturers like Cobham and Iridium, Santamarta found it full of backdoors, hardcoded credentials, undocumented or insecure protocols and weak encryption algorithms.
All of these vulnerabilities could allow an attacker to compromise the affected products, and potentially interfere with essential navigation and safety systems of the ship or a plane.
“In certain cases no user interaction is required to exploit the vulnerability, just sending a simple SMS or specially crafted message from one ship to another ship can do it,” wrote the researcher on the Black Hat website.
These vulnerabilities could affect not just transport but any field which relies on SATCOM equipment, including military installations, emergency services, media services, and industrial facilities.
Santamarta will explain his methods for discovering such software flaws and run a live demo at Black Hat on Thursday. So far, the SATCOM industry has downplayed the risks posed by unsecured firmware, but the talk is expected to reveal the level of technical details that has never been published before.
Last month, Black Hat announced it was cancelling the hotly anticipated presentation on identifying Tor users “on a budget”, since the researchers from Carnegie Mellon university did not receive permission to publish the materials developed at the government-funded Software Engineering Institute (SEI).
How well do you know network security? Try our quiz and find out!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…