A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data. Read More
Related Posts
Hacking Crew Breached the US Air Force Satellite In Orbit And Won $50,000
Hacking Crew Breached the US Air Force Satellite In Orbit And Won $50,000
This year’s Hack-A-Sat competition challenged teams to hack into an actual satellite in orbit. The US Air Force Moonlighter, which was launched especially for the event, was the first real satellite the hackers were permitted to target.
The Aerospace Corporation and the U.S. Air Force Research Laboratory developed the small cubesat known as Moonlighter, launched on June 5, 2023, on a SpaceX Falcon 9 rocket alongside a cargo payload for the International Space Station.
Five teams participated in the challenge, with “mHACKeroni,” a team of five Italian cyber research firms members, taking first place this year. $50,000 was awarded for first place.
Poland Can Into Space, a cyber research team, took second place and received $30,000. In addition, the combined British-American team “jmp fs:[rcx]” took third place and received $20,000.
Target Given to the Team
Teams were given the goal of breaking into Moonlighter to bypass the satellite’s limitations on the types of targets it may view on the ground, command it to snap a photograph of that target, and then download the picture to a ground station.
According to information shared with Cyber Security News, one significant obstacle was that the Moonlighter wasn’t always accessible.
The satellite only had a limited number of open windows during the competition to download or upload files, telemetry, and scripts depending on where it was in orbit.
Since the CTF operates under real-world circumstances, even the CTF runners occasionally fail to establish a connection during the designated contact windows.
The U.S. Air Force and U.S. Space Force’s Space Systems Command strive to find vulnerabilities that may be utilized to enhance the security of satellite systems overhead by organizing competitions like Hack-A-Sat.
The five teams who proceeded to the Vegas finals defeated hundreds of other teams with thousands of players on them.
Capt. Kevin Bernert of the U.S. Space Force revealed during the announcement that the Hack-A-Sat organizers were still gathering data from the Moonlighter, so the crew congregated in an emergency stairway before relocating to a hotel room to connect to the Moonlighter and gather data to establish the final results.
The CTF host at Hack-A-Sat and the developer of the reverse engineering program Binary Ninja, Jordan Wiens, started to reveal the winners.
Weins announced, “Congratulations to team mHACKeron. Making it here at all is really impressive.”
According to their profile, mHACKeroni is made up of 60 members from Italy who represent the academic community and won both bragging rights and prize money.
Proud to be here with @mhackeroni team winning @hack_a_sat space ctf ! pic.twitter.com/M7mbCa37bY
— Giorgio Campiotti (@giorgiofox) August 13, 2023
“We are so proud of the entire Hack-A-Sat effort, and particularly the development of Moonlighter as the first and only hacking sandbox in space,” Col. Neal Roach of Space Systems Command said in a statement.
“Hack-A-Sat has raised public awareness on the importance of space cybersecurity and has helped to strengthen the industry, security, and government partnership that we need to build more resilient space systems that will keep our nation and our world secure.”
Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.
The post Hacking Crew Breached the US Air Force Satellite In Orbit And Won $50,000 appeared first on Cyber Security News.
Cyber Security News
Lolek Bulletproof Hosting Servers Seized, 5 Key Operators Arrested
Lolek Bulletproof Hosting Servers Seized, 5 Key Operators Arrested
European and U.S. law enforcement agencies have announced the dismantling of a bulletproof hosting service provider called Lolek Hosted, which cybercriminals have used to launch cyber-attacks across the globe.
"Five of its administrators were arrested, and all of its servers seized, rendering LolekHosted.net no longer available," Europol said in a statement.
"The service facilitated the Read More
The Hacker News | #1 Trusted Cybersecurity News Site
LockBit reloaded: Unveiling the next chapter in cybercrime.
LockBit reloaded: Unveiling the next chapter in cybercrime.
LockBits reawakening. China’s ramp up to safety for vital sectors. Data leak leaves China feeling exposed. Malware hidden by North Korea in fake developer job listings. UK Watchdog rebukes firm for biometric scanning of staff at leisure centers. SVR found adapting for the cloud environment. DOE proposes cybersecurity guidelines for the electric sector. Wideness of breach in the financial industry revealed. Moving on to better things. Things are looking up in the cybersecurity startup ecosystem. UK’s National Cyber Security Centre announced they are launching a Cyber Governance Training Pack for boards. N2K’s President Simone Petrella talks with Elastic’s CISO Mandy Andress about the CISO role and the intersection of cybersecurity, law, and organizational strategy. And, there’s a facial recognition battle going on at Waterloo, the University of Waterloo that is. Read More
The CyberWire