NASA has had its ships exposed to hackers for three years. An AI discovered it in just four days
If there is a place where they should be open to any type of communication, it should be in a space agency. And it is no longer just a cinematic issue (although it has gone to great lengths to delve into that topic in the cinema), it is that communications are critical: from things as mundane as explaining that all processes are going well, to anomalies, to the specific future of a mission. Getting your hands on the communications of the National Aeronautics and Space Administration has to be a real treat and not only to boycott the American entity, but also to access confidential information or even to develop conspiracy theories that dismantle that man will reach the moon. Well, as incredible as it may seem, hacking NASA has been easier than you might think. Three years exposed and billions of dollars at stake And it hasn’t just been a little while: communications between Earth and NASA spacecraft have suffered a critical vulnerability for three years against possible computer attacks. Nor was it trivial: that breach in security could have allowed attackers to take over space missions like the agency’s rovers on Mars. The consequence would not have been cheap either: it poses a threat to billions of dollars in space infrastructure and the performance of these missions. Vulnerabilities are usually detected when it is too late or thanks to the action of researchers, although in this case it was the work of artificial intelligence, more specifically a cybersecurity algorithm integrated into AISLE security software, whose objective is to protect communications between spacecraft and terrestrial systems. This vulnerability had gone unnoticed by human eyes in multiple code reviews throughout that time. However, this autonomous AI-based analyzer detected it and helped correct it in four days, account the team of the Californian startup. As detailed, the fault was in the authentication system and to take advantage of it you only needed to have operator credentials. A little social engineering such as phishing or infecting computers to obtain usernames and passwords of NASA workers would be enough to make this possible. From here, something as common as authentication would become a weapon to, for example, inject commands that are executed with full privileges to access the system. The consequences could be fatal: from intercepting data to hijacking a ship. The only “good” thing about this vulnerability is that it was an essential requirement to execute it on the system locally, which obviously reduces the risk compared to remote. The integration of systems with AI in collaboration with humans is the order of the day and although in this case it has been the machine that has brought out the colors for the team of people, it is worth remembering that with the fall of half the internet because of Amazon servers, the responsibility fell on automation: It was the operators who had to intervene to fix it manually. In Xataka | NASA finds ‘space gum’ and glucose on Bennu: we now have the missing ingredient to explain the origin of life In Xataka | NASA invites you to send your name to the Moon for free. Behind it there is something more than a simple symbolic gesture Cover | Photo of NASA Hubble Space Telescope in Unsplash