Starlink was made aware of the security defects last year by Wouters himself, and even paid the researcher for his efforts via its bug bounty scheme.Įven though parent company SpaceX patched the vulnerabilities at the time - prompting Wouters to modify the modchip - it seems the core issue cannot be resolved without a new model of the main chip being produced. The homemade printed circuit board (PCB) is then capable of shorting the system, albeit temporarily, via a fault injection attack - this method, or glitch, was used to circumvent the security measures Starlink has in place.Īfter revealing the hack at his presentation, Wouters released the tool on GitHub, which gives a breakdown on how to perform the attack itself. The tool itself was formed via a custom circuit board (modchip), with the price of the overall parts required for the device costing just $25. In order to find any exploits within the satellite dish’s software, Wouters purchased a dish and attached his hacking device onto it. If left exposed, this would give threat actors free rein to access Starlink’s system and then run custom code on the network’s devices. However, Wouters has now found a way to hack into the dishes due to various hardware vulnerabilities. Great, hackers are now using ChatGPT to create malware Presidents Day Sales 2023: Tracking the deals as they start Microsoft’s Bing Chat: how to join the waitlist now
0 Comments
Leave a Reply. |