Some of the most advanced satellites in the world seemed untouchable. Two hackers showed that they could be kidnapped

In satellites, each maneuver depends on software that is rarely subjected to public security evidence. Demonstrations in controlled environments have put vulnerabilities on the table that, under certain conditions, could allow the Remote Space Systems Control. It is not a timely failure or an isolated experiment: it is a sign that security should be reviewed with magnifying glass before it becomes news for wrong reasons. In August, during conferences Black Hat USA and Def with held in Las Vegas, researchers shared their findings, According to IEEE Spectrum. The work focused on two key pieces: the Core Flight System (CFS), used in NASA multiple missions, including the telescope James Webband Yamcs, a control system of the European company Space Applications Services. The failures, however, were identified and corrected before their dissemination. The finding reopening the debate on cybersecurity in space Behind the finding are Andrzej Olchawa and Milenko Starcik, experts from Visionspace with direct experience in space operations. They analyzed open source software with the mentality of an adversary, seeking reproducible vulnerabilities. They did not need months of analysis: in a few hours they managed to locate 37 failures that, in controlled scenarios, allowed to manipulate critical systems. They acted on their own environments and coordinated with developers to patch the software before disseminating their conclusions. The analysis of the Core Flight System (CFS) revealed that, although it is a key piece in NASA missions, its exploitation would not be simple. To compromise it would take toCceso Physical to a land station and operate at frequencies reserved for space communications. Even so, researchers warn that, in the hands of a state actor with sufficient resources and coverage, this scenario is plausible. In their demonstration they explained that, with that capacity, it would be possible to raise orders to the satellite and modify their behavior. Yamcs, unlike CFS, was more accessible to an attacker. The researchers showed that a campaign would suffice Phishing Successful to load a malicious configuration in the control center. With that entrance door they could issue arbitrary orders or alter files, all from any location with Internet connection. The exercise showed how this vector opens a much larger and less protected attack surface. In Black Hat USA 2025, Andrzej Olchawa deepened the reach of the tests and shared details on how vulnerabilities exploited. He stressed that All maneuvers were executed in simulated environments and that no real satellite was at risk. His explanation sought to give unlarmed technical context, showing precisely how far actors with sufficient knowledge and access to the right systems could reach. “In some cases, we were able to send arbitrary telecomandos to the ships through the mission control system. In others, we managed to take control of the entire control center and, in other cases, if you are able to send telecomands to the ship, you can get remote execution of code directly in it.” The threat panorama has changed: where there were private networks and local stations before, there are now remote control, cloud services and connections from home. This evolution multiplies the attack possibilities, according to researchers, and explains why theoretical vulnerabilities are now a reason for alert. An example is THE ATTACK AGAINST VIASAT IN 2022which affected thousands of users and coincided with the beginning of the war in Ukraine. The case suggests that space systems are not isolated from global conflicts. Corrections arrived on time for open projects, with updates that mitigated the techniques demonstrated in the laboratory. The pending challenge is in closed systemswhere the absence of access to the code limits the review by external experts. Images | Gontran Isnard | Xataka with Grok In Xataka | Perseverance has found what, according to NASA’s director, is “the clearest indication of life we ​​have seen on Mars”

Mexico celebrates the release of two compatriots who were kidnapped by Yemen’s Houthis

The government of Claudia Sheinbaum celebrated the release of two Mexicans who were part of the crew of the cargo ship, ‘Galaxy Leader’, and who had been kidnapped by Houthi militants from Yemen in November 2023. “On behalf of the Government of Mexico, The SRE appreciates the determined support granted by the Sultanate of Oman for its good offices, to Iran, Qatar, Saudi Arabia, to the UN Special Envoy for Yemen and to the honorary consuls of our country in Yemen and Oman,” says a statement from the Mexican Foreign Ministry. The Mexicans who were released are Marcos Gómez Jerez and Arturo Alberto Zacarías Meza, who were received by the Mexican ambassador to Saudi Arabia, Aníbal Gómez Toledo, and by personnel from that diplomatic representation. “Since the capture of the ship, The Ministry of Foreign Affairs (SRE) deployed intense diplomatic activity to achieve his release through efforts and contacts through the governments of friendly countries, including Oman, Iran, Saudi Arabia and Qatar, as well as the United Nations (UN) and the International Committee of the Red Cross, which contributed to facilitating communication with the Houthi representatives,” says the Mexican Ministry of Foreign Affairs. The freed Mexicans were part of the crew of the cargo ship, ‘Galaxy Leader’.Credit: Ministry of Foreign Affairs of Mexico | copyright To achieve their release, the Mexican Foreign Ministry points out that permanent contact was always maintained with the families of the Mexicans who were provided with information and support throughout the process. “As a result of these efforts, both compatriots were allowed frequent and direct telephone communication with their families. and the access of the Honorary Consul of Mexico in Yemen to the detainees was authorized, who confirmed their good health and ensured that they received dignified treatment,” he explains. “It is important to mention that the Houthi leadership had conditioned the release of the “Galaxy Leader” crew. -including both compatriots- to a ceasefire and an improvement in conditions in Gaza, which is why the agreement reached between Israel and Hamas facilitated their release,” the Mexican Foreign Ministry states. The Houthi assault on the cargo ship ‘Galaxy Leader’ took place on November 19, 2023after weeks of missile and drone launches by Yemeni insurgents against Israel in support of the Palestinians in the Gaza Strip. The ship, which was heading from India to Türkiyeis a vehicle transporter that sailed under the flag of the Bahamas and was partially owned by Israeli magnate Rami Unger, according to local press. However, on the day of the ship’s capture, Israeli Prime Minister Benjamin Netanyahu’s office stated that “the ship is owned by a British company and operated by a Japanese company” and, on board, “there are 25 members of the crew of different nationalities, including from Ukraine, Bulgaria, the Philippines and Mexico.” Keep reading:• Claudia Sheinbaum Pardo makes history by taking the oath as the first President of Mexico• Claudia Sheinbaum recognizes the work of migrants and assures that it is time for women• Sheinbaum will assume the presidency of Mexico with 63% favorable opinion among Mexicans

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.