Russia Hacked Ukrainian Satellite Communications

Russia is believed to have hacked the US satellite communications provider Viasat on the same day as its Ukraine invasion. More than 22,000 miles above Earth, the KA-SAT is in geostationary orbit at 7,000 miles per hour. The the satellite beams high-speed Internet to users across Europe where  it has helped homeowners, businesses, and militaries get online since 2011. 

As Russian troops moved into Ukraine on  February 24, satellite Internet connections were disrupted. Numerous users were affected included some in the Ukrainian military, and the attack dramatically demonstrated the vulnerability of commercial satellite communications on which the US military increasingly relies. 

It is now believed that the Russian military spy service, the GRU, was behind a hack that affected the Ukrainian military’s communications at the start of Russia's invasion into the country. The hack affected the KA-SAT satellite broadband network, owned by Viasat, an American satellite communications company. On February 24th, the day the Russian invasion of Ukraine began, the KA-SAT network was hit by outages that affected Ukraine and surrounding regions in Europe. 

Sources say that the GRU has led in operations against Ukraine, although there have not been major cyber attacks against the West from from this source, so far.  Overall, Ukraine has proved more resilient to cyber attacks than many had expected. 

Intelligence agencies  say the attack fits closely with Russian military doctrine, in which cyber attacks are used to support specific military objectives, in this case trying to sow confusion by disrupting Ukrainian command and control. It appears to be the most significant cyber attack linked to the conflict so far, affecting military, as well as government communications. 

In the US, the Cybersecurity & Infrastructure Security Agency (CISA) have warned that they are "aware of possible threats to US and international satellite communication networks", and have urged providers to improve their security because of the continuing potential risks. 

One concern had been that Russia could retaliate for Western sanctions by launching cyber attacks against the West, perhaps unleashing criminal gangs who use ransomware to lock businesses and organisations out of their systems. 

The White House has warned that it has seen intelligence of possible activity, however, it is not clear yet whether this is above the normal level of Russian cyber activity that is happening all the time or whether it is an indication that Russia is preparing for something more serious.

Satellite Internet connections are often used in areas with low cable coverage and are used by everyday citizens, as well as official organisations.  The set-up is different from your typical home or office Wi-Fi network, which mostly rely on wired broadband connections. 

AirForce Magazine:    BBC:    The Verge:     Washington Post:      The Hill:    Wired:      Samachar Central:

You Might Also Read: 

SpaceX Plan For 4k Satellite Broadband Network:

 

« Mobile Cyber Attacks: The Different Facets Of Smartphone Malware
Google’s Emergency Update For Chrome »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

Qevlar AI

Qevlar AI

Qevlar AI empowers SOC teams, to eliminate redundant tasks and refocus on what truly matters - making the most of every employee within the SecOps team.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.