通过未加密卫星窃听内部网络
Eavesdropping on Internal Networks via Unencrypted Satellites

原始链接: https://satcom.sysnet.ucsd.edu/

研究人员展示了通过地球静止轨道(GEO)卫星传输的未加密数据的惊人可访问性。他们使用消费级卫星天线和软件,成功捕获了来自全球Ku波段卫星的IP流量——来自39颗卫星的411个转发器,所有数据均来自圣地亚哥的一个地点。 该研究表明,由于成本、带宽限制、远程接收机电源限制以及故障排除困难,缺乏广泛的加密。虽然许多现代通信优先考虑加密,但卫星网络往往落后,导致数据容易被被动窃听。 重要的是,这项研究完全是被动的,仅涉及观察——没有发生黑客行为或干扰。研究团队正主动帮助组织审计其网络,以评估潜在的暴露风险。他们专注于常用作关键基础设施的地球静止轨道卫星,尚未独立验证像星链(Starlink)这样新型低地球轨道(LEO)系统的加密状态。

## 窃听卫星网络:摘要 最新研究强调了一个长期存在的安全漏洞:通过地球静止轨道(GEO)卫星进行的未加密数据传输。研究人员展示了使用现成的消费级设备(约300美元)和一种新颖的信号对准方法,拦截内部网络流量的能力——包括潜在的敏感数据,如短信和电话。 尽管拦截这些信号的可能性并非新鲜事(已有数十年记录),但这项研究的范围——成功解析来自39颗卫星的流量并识别出七个先前未报告的协议栈——意义重大。研究人员负责任地向受影响的供应商披露了他们的发现,促使一些供应商解决了这个问题。 该报告引发的讨论集中在为什么这个漏洞在之前的研究之后仍然存在。一些人认为这是一种“智力垃圾收集”——公开强调已知问题以推动必要的安全升级。另一些人则指出实施强大的安全措施的成本和复杂性,以及组织倾向于忽视内部网络漏洞。这项研究强调了持续安全监控的重要性,以及超越对网络安全假设的必要性。
相关文章

原文

What did your study do?

We set up a consumer-grade satellite dish on the roof of a university building in San Diego, California with a positioning motor and a consumer-grade TV tuner card to capture raw bytes. We then scanned for all transponders (position and frequency) visible from our fixed location, and wrote custom protocol-parsing code to reconstruct network packets from the quirky custom protocol stacks we reverse-engineered from different vendors. We observed 411 transponders across 39 GEO satellites, and our single fixed-location dish could receive IP traffic from 14% of all global Ku-band satellites.

Why aren't all GEO satellite links encrypted?

There are direct costs to enabling encryption. Encryption imposes additional overhead to an already limited bandwidth, decryption hardware may exceed the power budget of remote, off-grid receivers, and satellite terminal vendors can charge additional license fees for enabling link-layer encryption. In addition, encryption makes it harder to troubleshoot network issues and can degrade the reliability of emergency services. Some users may forgo encryption intentionally; others may be unaware these links are unencrypted or underestimate the risk and ease of eavesdropping attacks. While significant academic and activist attention has been put into ensuring nearly universal use of encryption for modern web browsers, there has been much less visiblity and attention paid to satellite network communications.

Several vendors told us they were in the process of transitioning to encrypted links.

What about Starlink/LEO?

Our study focused on GEO satellite systems, which remain in a fixed point relative to the surface of the earth. These systems remain in wide use for critical infrastructure because of their reliability and backwards compatibility. We did not study LEO (Low Earth Orbit) systems (e.g., Starlink), which offer higher bandwidth and greater coverage but require more complicated receiving hardware. Our understanding is those links are encrypted, but we have not independently verified this.

What about the uplink?

The downlink signal from a satellite typically broadcasts to a wide geographic area, but the returning uplink is more focused. This means that from our single vantage point in San Diego, California, we were only able to observe one half of a given network connection.

Did you have to hack or interfere with any satellites?

Our study was fully passive; we simply set up a consumer-grade satellite dish on Earth and observed traffic without transmitting ourselves.

Can you tell if someone is listening to traffic?

Since this unencrypted data can be observed fully passively, there is no way to know if someone has set up a dish to listen.

Can you audit our network?

If you would like our assistance in determining whether your network traffic has been exposed, please get in touch.

Is this legal/ethical?

We consulted with the University of California legal counsel on the design of our study and worked closely with them during disclosure. We have gone through considerable effort to attempt to disclose the vulnerabilities we found to affected parties.

联系我们 contact @ memedata.com