Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday June 20 2019, @07:26PM   Printer-friendly
from the Pi-in-their-face dept.

Feds: Cyberattack on NASA's JPL Threatened Mission-Control Data

NASA's Jet Propulsion Laboratory (JPL) may know how to send delicate equipment to Mars, but basic cybersecurity best practices appear to pose an issue for it. A comprehensive federal review has detailed an April 2018 security incident that compromised mission systems – stemming from multiple IT security-control weaknesses exposing NASA systems and data. The review, released Tuesday and carried out by the U.S. Office of the Inspector General, said that the weaknesses "reduce JPL's ability to prevent, detect and mitigate attacks targeting its systems and networks."

Specifically, poor practices when it comes to network segmentation and third parties were source of a cyberattack in April 2018, OIG said. In that incident, hackers targeted a Raspberry Pi computer that was not authorized to be attached to the JPL network, exploited it, and then proceeded to take advantage of the network's lack of segmentation to find a network gateway and pivot deeper into the system.

The attack had deep-space repercussions (literally) that spread to mission control in Houston. The adversaries were able to move between various systems connected to the pwned gateway, including those involved in multiple JPL mission operations and the Deep Space Network (DSN), which is NASA's international array of giant radio antennas that supports interplanetary spacecraft missions. "As a result [of the hack], in May 2018 IT security officials from the Johnson Space Center (Johnson), which handles such programs as the Orion Multi-Purpose Crew Vehicle and International Space Station, elected to temporarily disconnect from the gateway due to security concerns," OIG explained.

Also at Engadget and PC Magazine.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by J053 on Thursday June 20 2019, @11:25PM

    by J053 (3532) <{dakine} {at} {shangri-la.cx}> on Thursday June 20 2019, @11:25PM (#858293) Homepage
    One of the articles on this mentioned that JPL has a security incident backlog of over 180 days. So, that's how. They also supposedly have a security database (inventory, etc.), but according to the NASA IG,

    “One system administrator told us he does not regularly enter new devices into the ITSDB as required because the database’s updating function sometimes does not work and he later forgets to enter the asset information,” the report noted. “Consequently, assets can be added to the network without being properly identified and vetted by security officials.

    Source: ThreatPost, Inc. [threatpost.com]

    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3