Russia Hacked Ukrainian Satellite Communications

Russia is believed to have hacked the US satellite communications provider Viasat on the same day as its Ukraine invasion. More than 22,000 miles above Earth, the KA-SAT is in geostationary orbit at 7,000 miles per hour. The the satellite beams high-speed Internet to users across Europe where  it has helped homeowners, businesses, and militaries get online since 2011. 

As Russian troops moved into Ukraine on  February 24, satellite Internet connections were disrupted. Numerous users were affected included some in the Ukrainian military, and the attack dramatically demonstrated the vulnerability of commercial satellite communications on which the US military increasingly relies. 

It is now believed that the Russian military spy service, the GRU, was behind a hack that affected the Ukrainian military’s communications at the start of Russia's invasion into the country. The hack affected the KA-SAT satellite broadband network, owned by Viasat, an American satellite communications company. On February 24th, the day the Russian invasion of Ukraine began, the KA-SAT network was hit by outages that affected Ukraine and surrounding regions in Europe. 

Sources say that the GRU has led in operations against Ukraine, although there have not been major cyber attacks against the West from from this source, so far.  Overall, Ukraine has proved more resilient to cyber attacks than many had expected. 

Intelligence agencies  say the attack fits closely with Russian military doctrine, in which cyber attacks are used to support specific military objectives, in this case trying to sow confusion by disrupting Ukrainian command and control. It appears to be the most significant cyber attack linked to the conflict so far, affecting military, as well as government communications. 

In the US, the Cybersecurity & Infrastructure Security Agency (CISA) have warned that they are "aware of possible threats to US and international satellite communication networks", and have urged providers to improve their security because of the continuing potential risks. 

One concern had been that Russia could retaliate for Western sanctions by launching cyber attacks against the West, perhaps unleashing criminal gangs who use ransomware to lock businesses and organisations out of their systems. 

The White House has warned that it has seen intelligence of possible activity, however, it is not clear yet whether this is above the normal level of Russian cyber activity that is happening all the time or whether it is an indication that Russia is preparing for something more serious.

Satellite Internet connections are often used in areas with low cable coverage and are used by everyday citizens, as well as official organisations.  The set-up is different from your typical home or office Wi-Fi network, which mostly rely on wired broadband connections. 

AirForce Magazine:    BBC:    The Verge:     Washington Post:      The Hill:    Wired:      Samachar Central:

You Might Also Read: 

SpaceX Plan For 4k Satellite Broadband Network:

 

« Mobile Cyber Attacks: The Different Facets Of Smartphone Malware
Google’s Emergency Update For Chrome »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

National Cybersecurity Society (NCSS) - USA

National Cybersecurity Society (NCSS) - USA

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

Synergy Quantum

Synergy Quantum

Synergy Quantum has pioneered a proprietary suite of military-grade, quantum-secure communication technologies.