North Korea Hacked India's Moon Mission

North Korean hackers have reportedly attacked Indian space agency systems. According to cyber experts, the Indian Space Research Organisation (ISRO) was attacked by hackers when it was on its mission to land a spacecraft on the Moon. 

India’s ambitious mission had attempted a historic soft landing on the lunar south pole region.

The country’s mission to the Moon faced a setback when a control station in the southern Indian city of Bengaluru lost contact with the Chandrayaan-2 spacecraft in September just minutes before its landing on the Moon. The reports said an ISRO staff member is feared to have opened phishing emails from North Korean spammers.Such phishing emails caused the accidental installation of malware on to their systems.

According to a Financial Times report, ISRO was warned of the cyberattack during the Chandrayaan-2 Moon mission. ISRO insisted that its computer systems and networks had not been ‘compromised’ by the attempted hacking. The space agency will now have to examine the possible threat from North Korean spammers.

Indian officials have denied that a cyberattack affected the Moon mission, which ended after ISRO lost contact with the spacecraft.

The latest news has emerged after India’s largest nuclear power plant admitted it had been attacked by hackers. Indian authorities admitted there had been a cyber-attack on the Kudankulam nuclear power plant, located in the southern Indian state of Tamil Nadu. However, the hackers were found to have targeted an administrative computer.

Last month, the US space agency NASA found no trace of Chandrayaan-2’s Vikram lander in the latest photographic  images captured by its Moon orbiter of the lunar south pole region. 

Eastern Eye:         Image: ISRO

You Might Also Read: 

Communications Satellites Are Vulnerable:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

 

 

 

 

 

« Four Security Principles For For Small Business
Ethical Hackers And Criminal Hacking »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Cybermate

Cybermate

Cybermate is the first affordable, gamified ‘Psybersecurity’ awareness training platform that reduces behavioural risk and achieves compliance with Australian cybersecurity standards.