Russia Hacked Ukrainian Satellite Communications

Russia is believed to have hacked the US satellite communications provider Viasat on the same day as its Ukraine invasion. More than 22,000 miles above Earth, the KA-SAT is in geostationary orbit at 7,000 miles per hour. The the satellite beams high-speed Internet to users across Europe where  it has helped homeowners, businesses, and militaries get online since 2011. 

As Russian troops moved into Ukraine on  February 24, satellite Internet connections were disrupted. Numerous users were affected included some in the Ukrainian military, and the attack dramatically demonstrated the vulnerability of commercial satellite communications on which the US military increasingly relies. 

It is now believed that the Russian military spy service, the GRU, was behind a hack that affected the Ukrainian military’s communications at the start of Russia's invasion into the country. The hack affected the KA-SAT satellite broadband network, owned by Viasat, an American satellite communications company. On February 24th, the day the Russian invasion of Ukraine began, the KA-SAT network was hit by outages that affected Ukraine and surrounding regions in Europe. 

Sources say that the GRU has led in operations against Ukraine, although there have not been major cyber attacks against the West from from this source, so far.  Overall, Ukraine has proved more resilient to cyber attacks than many had expected. 

Intelligence agencies  say the attack fits closely with Russian military doctrine, in which cyber attacks are used to support specific military objectives, in this case trying to sow confusion by disrupting Ukrainian command and control. It appears to be the most significant cyber attack linked to the conflict so far, affecting military, as well as government communications. 

In the US, the Cybersecurity & Infrastructure Security Agency (CISA) have warned that they are "aware of possible threats to US and international satellite communication networks", and have urged providers to improve their security because of the continuing potential risks. 

One concern had been that Russia could retaliate for Western sanctions by launching cyber attacks against the West, perhaps unleashing criminal gangs who use ransomware to lock businesses and organisations out of their systems. 

The White House has warned that it has seen intelligence of possible activity, however, it is not clear yet whether this is above the normal level of Russian cyber activity that is happening all the time or whether it is an indication that Russia is preparing for something more serious.

Satellite Internet connections are often used in areas with low cable coverage and are used by everyday citizens, as well as official organisations.  The set-up is different from your typical home or office Wi-Fi network, which mostly rely on wired broadband connections. 

AirForce Magazine:    BBC:    The Verge:     Washington Post:      The Hill:    Wired:      Samachar Central:

You Might Also Read: 

SpaceX Plan For 4k Satellite Broadband Network:

 

« Mobile Cyber Attacks: The Different Facets Of Smartphone Malware
Google’s Emergency Update For Chrome »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Infosec (T)

Infosec (T)

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Cyberagentur (Cyber Agency)

Cyberagentur (Cyber Agency)

Cyberagentur is the Federal Agency in Germany for innovation in cybersecurity. Our mission is to advance research and groundbreaking innovations in the field of cybersecurity and related technologies.

Norwegian Data Protection Authority (Datatilsynet)

Norwegian Data Protection Authority (Datatilsynet)

The Norwegian Data Protection Authority (Datatilsynet) is the national data protection authority for Norway.