Can American’s jet propulsion Laboratory, NASA (JPL) and produces some of the most high-tech things on the planet, for example, the same Rovers and space telescopes, but it turns out that she has experienced very serious problems with cybersecurity. According to the portal Engadget, referring to the report of the Office of inspector General of the Agency, computer network security one of the leading research laboratories in the world is at a mediocre level, and that was the reason for her successful hacker break-in in April 2018.
How to hack server NASA?
According to the source, the attackers, using unauthorized computer-based Raspberry Pi (single Board compact computer the size of a Bank card, originally designed as a budget system for teaching science, but later received a wider application) was able to steal 500 MB of data, located on one of the main systems. Moreover, the hackers used the same opportunity to find a gateway that would allow them to penetrate the internal network of JPL. Due to this they got access to some of the main missions of the space Agency NASA, including the Deep Space Network.
It is reported that hackers managed to access the JPL network through unauthorized computer based on Raspberry Pi and steal 500 MB of data, which were in one of the main systems. The hackers also used this opportunity to find a gateway that would allow to penetrate the internal network of JPL. In fact, it gave them access to several large NASA missions, including Deep Space Network, representing an international network of radio telescopes and communications equipment used for radio astronomy exploration of the Solar system and the Universe, and to control the interplanetary spacecraft. As a result, the safety Agency decided to unplug JPL projects to create a multipurpose transport ship “Orion” and the international space station, to hackers in the future won’t get to them.
The inspection also found that in addition to problems with the visibility of network connected devices and the lack of partitioning the network into separate subsystems, the security requests were not processed for long periods of time. It is noted that in some cases, these requests didn’t have any treatment within 180 days. Investigators emphasize that the practice of conducting and responding to such incidents by security personnel JPL differ from the requirements and recommendations of NASA.
In the aerospace Agency agreed with all findings of the inspection, and also promised to follow all the recommendations of the Supervisory authority, in addition to one — to create opportunities to search for threats, to find vulnerabilities before they lead to serious problems. From this point NASA does not agree.
Subscribe to our Yandex.Zen. Every day there are published materials that do not fall on the main site.