North Korea Hacked India's Moon Mission

North Korean hackers have reportedly attacked Indian space agency systems. According to cyber experts, the Indian Space Research Organisation (ISRO) was attacked by hackers when it was on its mission to land a spacecraft on the Moon. 

India’s ambitious mission had attempted a historic soft landing on the lunar south pole region.

The country’s mission to the Moon faced a setback when a control station in the southern Indian city of Bengaluru lost contact with the Chandrayaan-2 spacecraft in September just minutes before its landing on the Moon. The reports said an ISRO staff member is feared to have opened phishing emails from North Korean spammers.Such phishing emails caused the accidental installation of malware on to their systems.

According to a Financial Times report, ISRO was warned of the cyberattack during the Chandrayaan-2 Moon mission. ISRO insisted that its computer systems and networks had not been ‘compromised’ by the attempted hacking. The space agency will now have to examine the possible threat from North Korean spammers.

Indian officials have denied that a cyberattack affected the Moon mission, which ended after ISRO lost contact with the spacecraft.

The latest news has emerged after India’s largest nuclear power plant admitted it had been attacked by hackers. Indian authorities admitted there had been a cyber-attack on the Kudankulam nuclear power plant, located in the southern Indian state of Tamil Nadu. However, the hackers were found to have targeted an administrative computer.

Last month, the US space agency NASA found no trace of Chandrayaan-2’s Vikram lander in the latest photographic  images captured by its Moon orbiter of the lunar south pole region. 

Eastern Eye:         Image: ISRO

You Might Also Read: 

Communications Satellites Are Vulnerable:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

 

 

 

 

 

« Four Security Principles For For Small Business
Ethical Hackers And Criminal Hacking »

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

Thursday, Jan 28, 2021 - Join this webinar to learn how to improve your Cloud Threat Intelligence (CTI) program by gathering critical cloud-specific event data in the AWS Cloud.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

FireEye

FireEye

FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting.

it-sa - IT Security Expo and Congress

it-sa - IT Security Expo and Congress

it-sa is the only IT security exhibition in the German-speaking region and one of the most important worldwide events

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

Volon Cyber Security

Volon Cyber Security

Volon is a cyber security consulting firm that offers specialized solutions for corporates and governments in Cyber Threat Intelligence.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets