InvestorsHub Logo
Followers 5
Posts 2784
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Monday, 06/24/2019 4:45:58 PM

Monday, June 24, 2019 4:45:58 PM

Post# of 249148
Hacker Used Raspberry Pi to Steal Sensitive NASA Docs

https://gizmodo.com/hacker-used-raspberry-pi-to-steal-sensitive-nasa-docs-1835802380

Turns out a tiny Raspberry Pi was at the source of a big headache for NASA. An audit released by the NASA Office of Inspector General on June 18 reveals that an early 2018 cyberattack utilizing one of these mini-computers resulted in a hacker making off with restricted documents.

If you’re not familiar with Raspberry Pi, it’s a small computer about the same size and shape as a credit card. Since it costs about $35, it’s a popular tool for learning the basics of computer programming, robotics, and creating DIY projects. (You may have seen one featured in an episode of Mr. Robot.) As you might guess, its small size and flexible use mean people don’t always employ it for good.

Which brings us to NASA: The “unauthorized” Raspberry Pi created a portal through which the attacker pilfered files from the Jet Propulsion Laboratory (JPL), which handles robotic space and Earth science missions, including the Mars Curiosity rover, according to the agency’s OIG. This particular breach was discovered in April 2018, when JPL found an external user’s account was compromised. The hacker, using an unauthorized Raspberry Pi connected to the system, was able to expand their access once they logged into the network.

Two of the 23 stolen files—about 500MB in total—involved restricted information relating to the International Traffic in Arms Regulation and Mars Science Laboratory mission. Additionally, the hacker accessed two out of three primary JPL networks, leading NASA to temporary disconnect several space-flight-related systems from the JPL network. Perhaps most frightening is that the hack went undetected for 10 months.

Also disturbing: JPL didn’t have a complete or accurate inventory of system components on its network, according to the OIG report. Neither did it have security controls to consistently monitor and detect cyberattacks on its network—so administrators had no idea the Raspberry Pi was there because it wasn’t logged properly. As a result, it wasn’t properly monitored, and taking control over an unsupervised, practically ‘non-existent’ Raspberry Pi is ostensibly a fairly easy task for a hacker. According to the BBC, the audit found several other [b]“unknown” devices on the JPL network, though none were believed malicious.

So far no culprit has been caught or identified, though NASA’s OIG report says the investigation is ongoing. In the meantime, JPL has installed more monitoring agents on its firewalls and says it’s reviewing network access agreements for external partners. Gizmodo reached out to NASA for comment and how the agency plans to improve its lax security going forward but did not immediately receive a response.
==================================================================
Only known and approved devices (see highlights below) should have access to NASA's sensitive networks (Government networks as well)!!! Wave VSC 2.0 and Wave ERAS would have stopped this hacker!! Organizations not using two solutions such as these seems crazy if they were aware of them. The link below if read by those in government and commercial organizations may save organizations such as NASA a lot of money, their reputation and a lot of avoidable stress!!
=================================================================
https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
https://www.wavesys.com/products/wave-virtual-smart-card

https://www.wavesys.com/

https://www.wavesys.com/contact-information


















Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.