Feeds

DON'T PANIC! Satellite comms hacking won't be able to crash an aircraft

Cute idea but it just won't fly

Providing a secure and efficient Helpdesk

Black Hat 2014 Nervous fliers have one less thing to worry about after it turns out that, despite some alarmist reports, hackers won't be making planes fall out of the sky any time soon.

The sensational headlines came after reporters learned that Ruben Santamarta, a consultant with security firm IOActive, was going to talk at Black Hat about insecure satellite communications systems on aircraft. Now that he's given the full presentation at the conference in Las Vegas on Thursday, we can tell you what the deal is.

"We can disrupt satellite signals and modify the data channel but that doesn't mean you can completely control the aircraft," Santamarta said.

"Aircraft have several ways to communicate with the ground, including VHF, and they don't just rely on satellites."

He added that none of the testing IOActive carried out indicated that the avionics system could be controlled remotely by a hacker. Instead, the satellite signal could be jammed or occasionally spoofed by someone inside the aircraft using the in-flight Wi-Fi, although some of the hacks he described would require physical access to the hardware itself.

Santamarta's research into five manufacturers' satellite communications equipment uncovered various software security vulnerabilities – and a host of undocumented subroutines and login credentials hardcoded in the firmware.

He also found a host of backdoor services that, according to the manufacturers, could be used by support staff to get into systems to perform maintenance tasks without needing to ask for passwords from the equipment's owners.

"You should never put backdoors in code," he said. "It's always a security risk."

Santamarta reported that the satellite communications manufacturers had not taken his findings well. For example, he claimed Iridium had rejected his study and said that no patches or code revisions were needed, while Inmarsat had acknowledged that changes needed to be made.

So as you head off on your holidays you can breathe a little easier. It seems terrorists aren't going to be crashing planes with a computer any time soon. ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.