Report: Hackers seized control of NASA computers
In March 2011, theft of an unencrypted NASA notebook resulted in the loss of the algorithms used to command and control the International Space Station.
March 2nd, 2012
03:06 AM ET

Report: Hackers seized control of NASA computers

By Dan Merica

Hackers targeting sensitive NASA computers have gained access to employee credentials and taken control of systems at NASA's Jet Propulsion Laboratory, among other things, a federal report says.

The space agency's inspector general, Paul K. Martin, cited one case involving hackers with IP addresses in China.  In that case, intruders gained "full system access" to change or delete sensitive files and user accounts for "mission-critical" systems at the Jet Propulsion Laboratory, he said in a report issued this week."In other words," Martin said, "the attackers had full functional control over these networks."

In another attack, hackers stole credentials for about 150 NASA employees, the report said.

NASA reported that it was the target of 47 sophisticated cyberattacks - the report calls them "advanced persistent threats" - in 2011. Thirteen of those 47 attacks successfully compromised NASA computers.

"The individuals or nations behind these attacks are typically well organized and well funded and often target high-profile organizations like NASA," Martin said in his report, titled "NASA Cybersecurity: An Examination of the Agency's Information Security."

In total, the space agency reported 5,408 incidents "that resulted in the installation of malicious software on or unauthorized access to its systems" in 2010 and 2011.

"These incidents spanned a wide continuum from individuals testing their skill to break into NASA systems, to well-organized criminal enterprises hacking for profit, to intrusions that may have been sponsored by foreign intelligence services seeking to further their countries' objectives," Martin said.

NASA has conducted 16 investigations over the last five years that led to the arrests of foreign nationals from China, Great Britain, Italy, Nigeria, Portugal, Romania, Turkey and Estonia.

These intrusions "have affected thousands of NASA computers, caused significant disruption to mission operations, and resulted in the theft of export-controlled and otherwise sensitive data, with an estimated cost to NASA of more than $7 million," the report said.

Loss and theft have also been issues for NASA. Forty-eight agency mobile computing devices were reported lost or stolen between April 2009 and April 2011.  This led to the possibility that sensitive algorithms and data landed in unauthorized hands.

"For example, the March 2011 theft of an unencrypted NASA notebook computer resulted in the loss of the algorithms used to command and control the International Space Station," Martin wrote.

Martin testified in front of Congress on Wednesday and the report served as a precursor to his testimony. While in front of a House committee, Martin spoke about the slow pace of encryption for the agencies' mobile devices and the lack of technological security monitoring at NASA.

Post by:
Filed under: Cybersecurity • NASA
soundoff (173 Responses)
  1. n95 mask

    Nice post – people need to see more like this, because most info about this topic is done-to-death. You provide real insight to your readers.

    https://leonahuntproofreading.com/2020/10/20/is-it-secure-to-put-on-protective-face-masks-in-public-places/

    February 26, 2021 at 6:13 am | Reply
  2. Long Hairstyles

    The article posted was very informative and useful. You people are doing a great job. Keep going.

    https://www.hairstylesvip.com/long-hairstyles

    February 26, 2021 at 12:15 am | Reply
  3. Boost Instagram Post Views

    Hello! This post could not be written any better! Reading through this post reminds me of my good old room mate! He always kept talking about this. I will forward this page to him. Pretty sure he will have a good read. Many thanks for sharing!

    https://bonuslikes.com/product-tag/real-likes-instagram/

    February 25, 2021 at 10:34 pm | Reply
1 2

Leave a Reply to Devastator


 

CNN welcomes a lively and courteous discussion as long as you follow the Rules of Conduct set forth in our Terms of Service. Comments are not pre-screened before they post. You agree that anything you post may be used, along with your name and profile picture, in accordance with our Privacy Policy and the license you have granted pursuant to our Terms of Service.