{"id":10717,"date":"2022-08-23T09:34:12","date_gmt":"2022-08-23T12:34:12","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10717"},"modified":"2022-08-23T09:34:12","modified_gmt":"2022-08-23T12:34:12","slug":"starlink-fue-hackeado-con-exito-usando-un-modchip-de-us-25","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10717","title":{"rendered":"Starlink fue hackeado con \u00e9xito usando un Modchip de u$s 25"},"content":{"rendered":"<p>El investigador belga Lennert Wouters revel\u00f3 en Black Hat (Sitio especializado en Ciberseguridad) de qu\u00e9 manera mont\u00f3 un exitoso ataque de inyecci\u00f3n de fallas en una terminal de usuario para el sistema de Internet basado en sat\u00e9lites de SpaceX. El investigador de seguridad belga ha pirateado con \u00e9xito el sistema de Internet basado en sat\u00e9lite Starlink operado por SpaceX utilizando una placa de circuito casera cuyo desarrollo cost\u00f3 alrededor de\u00a0$ 25, revel\u00f3 en Black Hat.<\/p>\n<hr \/>\n<div class=\"c-article__intro\">\n<p>Belgian researcher Lennert Wouters revealed at Black Hat how he mounted a successful fault injection attack on a user terminal for SpaceX\u2019s satellite-based internet system<\/p>\n<\/div>\n<div class=\"c-article__content js-reading-content\">\n<p>A Belgian security researcher has successfully hacked the SpaceX operated Starlink satellite-based internet system using a homemade circuit board that cost around $25 to develop, he revealed at Black Hat.<\/p>\n<p>Lennert Wouters revealed a voltage fault injection attack on a Starlink User Terminal (UT)\u2014or satellite dish people use to access the system \u2013 that allowed him to break into the dish and explore the Starlink network from there, he revealed in a presentation called \u201cGlitched on Earth by Humans\u201d at the annual ethical hacker conference this week.<\/p>\n<p>Wouters physically stripped down a satellite dish he purchased and created the custom board, or modchip, that can be attached to the Starlink dish, according to\u00a0<a href=\"https:\/\/www.wired.com\/story\/starlink-internet-dish-hack\/\" target=\"_blank\" rel=\"noopener\">a report on Wired<\/a>\u00a0about his presentation on Wednesday.<\/p>\n<p>He developed the tool using low-cost, off-the-shelf parts and was able to use it to obtain root access by glitching the Starlink UT security operations center bootrom, according\u00a0<a href=\"https:\/\/twitter.com\/LennertWo\/status\/1527212523182776320?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1527212523182776320%7Ctwgr%5E37207d9b5755ec01e86c342fb2cc6b13d7ab42aa%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fgizmodo.com%2Fembed%2Finset%2Fiframe%3Fid%3Dtwitter-1527212523182776320autosize%3D1\" target=\"_blank\" rel=\"noopener\">to a tweet<\/a>\u00a0previewing the presentation that he said was sent through a rooted Starlink UT.<\/p>\n<p>To design the modchip, Wouters scanned the Starlink dish and created the design to fit over the existing Starlink board. He soldered the modchip\u2014comprised of a\u00a0<a href=\"https:\/\/www.raspberrypi.com\/documentation\/microcontrollers\/rp2040.html\" target=\"_blank\" rel=\"noopener\">Raspberry Pi microcontroller<\/a>, flash storage, electronic switches and a voltage regulator\u2013to the existing Starlink PCB and connected it using a few wires, according to the report.<\/p>\n<p><strong>\u2018Unfixable Compromise\u2019<\/strong><\/p>\n<p>Once attached to the Starlink dish, the tool launched a fault injection attack to temporarily short the system, which allowed for bypass of Starlink\u2019s security protections so Wouters could break into locked parts of the system.<\/p>\n<p>Wouters\u2019 attack runs the glitch against the first bootloader\u2013the ROM bootloader that\u2019s burned onto the system-on-chip and can\u2019t be updated. He then deployed patched firmware on later bootloaders, which gave him control of the dish, according to the report.<\/p>\n<p>Wouters first performed the attack in a lab before implementing the modchip on the dish itself, he revealed in a\u00a0<a href=\"https:\/\/www.blackhat.com\/us-22\/briefings\/schedule\/index.html#glitched-on-earth-by-humans-a-black-box-security-evaluation-of-the-spacex-starlink-user-terminal-26982\" target=\"_blank\" rel=\"noopener\">write-up about his presentation<\/a>\u00a0published on the conference\u2019s website.<\/p>\n<p>\u201cOur attack results in an unfixable compromise of the Starlink UT and allows us to execute arbitrary code,\u201d Wouters wrote. \u201cThe ability to obtain root access on the Starlink UT is a prerequisite to freely explore the Starlink network.\u201d<\/p>\n<p>Wouters was able to explore the Starlink network and its communication links once he gained access to the system, adding that other researchers can potentially build on the work to further explore the Starlink ecosystem.<\/p>\n<p>Wouters\u00a0<a href=\"https:\/\/bugcrowd.com\/spacex\/hall-of-fame\" target=\"_blank\" rel=\"noopener\">revealed the vulnerability<\/a>\u00a0to SpaceX in a responsible way through its bug bounty program before publicly presenting on the issue.<\/p>\n<p><strong>Implications for Starlink<\/strong><\/p>\n<p>Starlink is SpaceX\u2019s low Earth orbit satellite constellation, an ambitious project that aims to provide satellite internet coverage to the whole world. Some 3,000 small satellites launched since 2018 already are providing internet to places that can\u2019t be reached by terrestrial networks. Other companies\u2014including Boeing, Amazon and Telesat\u2014also have launched their own satellite constellations to provide internet from space.<\/p>\n<p>Starlink\u2019s UT is one of three core components of the Starlink system; the other two are the satellites that move about 340 miles above the Earth\u2019s surface to beam down internet connections, and gateways that transmit connections up to the satellites. The UTs also communicate with satellites to provide internet on Earth.<\/p>\n<p>As is typically the case with any technology, the increase in use and deployment of Starlink and other satellite constellations also means that threat actors have a greater interest in finding their security holes to attack them.<\/p>\n<p>Indeed, Russia saw an advantage\u00a0<a href=\"https:\/\/www.wired.com\/story\/viasat-internet-hack-ukraine-russia\/?redirectURL=https:\/\/www.wired.com\/story\/viasat-internet-hack-ukraine-russia\/\" target=\"_blank\" rel=\"noopener\">in taking out a satellite<\/a>\u00a0providing internet communications across Europe by attacking its technology on the ground as Russian troops entered Ukraine on Feb. 24. The move successfully disrupted communications on the ground in Ukraine at a crucial time in the invasion, while also affecting other parts of Europe. It even had a ripple effect and\u00a0<a href=\"https:\/\/threatpost.com\/agencies-satellite-hacks-gps-jamming-airplanes-critical-infrastructure\/178993\/\" target=\"_blank\" rel=\"noopener\">jammed airplane navigation systems<\/a>\u00a0and other critical infrastructure.<\/p>\n<p>Knowing the critical nature of its security, SpaceX already has responded to Wouters\u2019 presentation with\u00a0<a href=\"https:\/\/api.starlink.com\/public-files\/StarlinkWelcomesSecurityResearchersBringOnTheBugs.pdf\" target=\"_blank\" rel=\"noopener\">a six-page paper<\/a>\u00a0published online inviting security researchers to \u201cbring on the bugs\u201d to help the company better protect the Starlink system as well as offering a detailed explanation of how it protects Starlink.<\/p>\n<p>The paper also congratulates Wouters\u2019 research, calling it \u201ctechnically impressive\u201d before poking a series of holes in it and assuring that Starlink\u2019s \u201cdefense-in-depth approach to security limits the overall impact of this issue to our network and users.\u201d<\/p>\n<\/div>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/threatpost.com\/starlink-hack\/180389\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/threatpost.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El investigador belga Lennert Wouters revel\u00f3 en Black Hat (Sitio especializado en Ciberseguridad) de qu\u00e9 manera mont\u00f3 un exitoso ataque de inyecci\u00f3n de fallas en&hellip; <\/p>\n","protected":false},"author":1,"featured_media":10718,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10717"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10717"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10717\/revisions"}],"predecessor-version":[{"id":10719,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10717\/revisions\/10719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/10718"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}