Russia Hacked Ukrainian Satellite Communications

Russia is believed to have hacked the US satellite communications provider Viasat on the same day as its Ukraine invasion. More than 22,000 miles above Earth, the KA-SAT is in geostationary orbit at 7,000 miles per hour. The the satellite beams high-speed Internet to users across Europe where  it has helped homeowners, businesses, and militaries get online since 2011. 

As Russian troops moved into Ukraine on  February 24, satellite Internet connections were disrupted. Numerous users were affected included some in the Ukrainian military, and the attack dramatically demonstrated the vulnerability of commercial satellite communications on which the US military increasingly relies. 

It is now believed that the Russian military spy service, the GRU, was behind a hack that affected the Ukrainian military’s communications at the start of Russia's invasion into the country. The hack affected the KA-SAT satellite broadband network, owned by Viasat, an American satellite communications company. On February 24th, the day the Russian invasion of Ukraine began, the KA-SAT network was hit by outages that affected Ukraine and surrounding regions in Europe. 

Sources say that the GRU has led in operations against Ukraine, although there have not been major cyber attacks against the West from from this source, so far.  Overall, Ukraine has proved more resilient to cyber attacks than many had expected. 

Intelligence agencies  say the attack fits closely with Russian military doctrine, in which cyber attacks are used to support specific military objectives, in this case trying to sow confusion by disrupting Ukrainian command and control. It appears to be the most significant cyber attack linked to the conflict so far, affecting military, as well as government communications. 

In the US, the Cybersecurity & Infrastructure Security Agency (CISA) have warned that they are "aware of possible threats to US and international satellite communication networks", and have urged providers to improve their security because of the continuing potential risks. 

One concern had been that Russia could retaliate for Western sanctions by launching cyber attacks against the West, perhaps unleashing criminal gangs who use ransomware to lock businesses and organisations out of their systems. 

The White House has warned that it has seen intelligence of possible activity, however, it is not clear yet whether this is above the normal level of Russian cyber activity that is happening all the time or whether it is an indication that Russia is preparing for something more serious.

Satellite Internet connections are often used in areas with low cable coverage and are used by everyday citizens, as well as official organisations.  The set-up is different from your typical home or office Wi-Fi network, which mostly rely on wired broadband connections. 

AirForce Magazine:    BBC:    The Verge:     Washington Post:      The Hill:    Wired:      Samachar Central:

You Might Also Read: 

SpaceX Plan For 4k Satellite Broadband Network:

 

« Mobile Cyber Attacks: The Different Facets Of Smartphone Malware
Google’s Emergency Update For Chrome »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Next Horizon

Next Horizon

In the Next Horizon incubator, new disruptive models are being developed in Industry 4.0, Automated Driving and Internet-of-Things.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

OriginalMy

OriginalMy

OriginalMy is a cybersecurity startup, focussed on digital governance and information authentication. Its mission is to prove authenticity using state-of-the-art cryptography and blockchain technology

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.