{"id":1481,"date":"2016-04-13T17:06:59","date_gmt":"2016-04-13T14:06:59","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=1481"},"modified":"2019-07-30T15:02:45","modified_gmt":"2019-07-30T12:02:45","slug":"was-the-nasa-hack-real-and-what-it-has-taught-us","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/was-the-nasa-hack-real-and-what-it-has-taught-us\/","title":{"rendered":"Was the NASA Hack Real and What It Has Taught Us"},"content":{"rendered":"<p>Like everyone, hackers are looking for their moment of glory. Perhaps, this explains their constant interest in the well-known and big names: <em>CIA<\/em>, <em>Pentagon<\/em>, <em>White House<\/em>&#8230; And not so long ago the <em>NASA\u2019s<\/em> turn has come. Apparently, not for the first time.<\/p>\n<p>The group of hackers <em>AnonSec<\/em>, which includes representatives of different countries, states that the hack occurred as far back as spring 2015. But they&#8217;ve managed to get this information across general public network only last February.<\/p>\n<p>If to believe hackers, the <em>NASA<\/em> server had been infected with the Trojan virus Gozi since 2013. <em>AnonSec<\/em> simply bought the access rights from the virus developers. The authentication security of the server turned out to be so weak that the <a href=\"https:\/\/www.protectimus.com\/blog\/brute-force-attack\/\">brute force password cracking software<\/a> found the first combination to get root-access in 0.32 seconds.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/www.space.com\/images\/i\/000\/036\/215\/original\/vabtours_slsrenovations01.jpg\" alt=\"NASA hack\" width=\"1280\" height=\"848\" \/><\/p>\n<p>It must be noted that the <em>AnonSec<\/em> is a fairly widespread category of ideological hackers rather than regular cyber-crooks who hack different resources just to earn some money.<\/p>\n<p>In particular, the purpose for hacking <em>NASA<\/em> servers was to obtain information on the weather control projects. According to the hackers, these projects are actively supported by the US government. The problem is that such experiments can do a great harm to the health of people in the entire region and affecting the quality of crops. This is due to the fact that in the conditions of the climate changes some native plants start growing poorly. Thus, the farmers are forced to use genetically modified seeds. And the negative influence of the genetically modified plants on the health has been proven long ago.<\/p>\n<p>Although previously <em>NASA<\/em> actually worked on the development of the climate change programs, the <em>AnonSec<\/em> hackers failed to find any evidence that it&#8217;s being done now.<\/p>\n<p>But en route, the hackers got access to the control over an intelligence drone <em>Global Hawk<\/em>. In this case, a drone is not a small amateur toy to play with. It is a large aircraft able to carry out flights all day long. Such a toy costs more than <em>$220 million<\/em>.<\/p>\n<p>However, the data protection at the <em>Global Hawk<\/em> appeared to be not up to par. The hackers nearly drowned the drone in the Pacific Ocean, but having noticed the change of the course an engineer of the flight control center switched the drone into manual control and thus prevented an accident.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/cdn1.img.sputniknews.com\/images\/103418\/35\/1034183557.jpg\" alt=\"NASA drone hack\" width=\"1000\" height=\"541\" \/><\/p>\n<p><em>AnonSec<\/em> team seeded a 276 GB Torrent archive that includes hundreds of videos from the UAV and weather radars, more than 2 thousand logbooks, real names, and email addresses and phone numbers of about 2.5 thousand <em>NASA&#8217;s<\/em> employees.<\/p>\n<p>Although the incident occurred about a year ago, the agency has not provided any official confirmation on it: large security-guarded organizations do not like to admit their mistakes.<\/p>\n<p>Moreover, the mass media, which the hackers addressed in order to spread information about hacking the <em>NASA&#8217;s<\/em> holy of holies, refused to publish it. Just last February the <em>InfoWars<\/em> published a report by the <em>AnonSec<\/em>.<\/p>\n<p>Only after these publications broke out in the network, <em>NASA<\/em> started responding. But, of course, it has not confirmed their servers have been hacked. According to the official commentary, it was the <em>NASA\u2019s<\/em> choice to put all the above-mentioned data for public access. They even provided the addresses of the sources the data had been taken from.<\/p>\n<p>Although the agency has not acknowledged the drone hacking, just a few days later it eliminated the vulnerability the hackers used to enter the system. According to <em>AnonSec<\/em>, the hackers failed to follow a beaten path the second time.<\/p>\n<p>So was <em>NASA<\/em> really hacked or not? In any case, this information is a good occasion to think about the importance of data protection in the digital environment.<\/p>\n<p>Which data protection means can prevent such incidents? First of all, it is a reliable authentication protection. Since, according to the hackers, <em>NASA<\/em> was hacked via the administrator account.<\/p>\n<p>The possibilities offered by a modern two-factor authentication can completely prevent unauthorized access to any device or account. 2FA is not only about one-time passwords, but a full package of measures and means that make the authentication of the client much more reliable. For more accurate authentication, we recommend using the <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">CWYS<\/a> (Confirm What You See) function, smart identification, and the hardware OTP tokens. Strengthened by these elements, 2-factor authentication provides a high level of information security.<\/p>\n<p>Keep in mind that data protection is never superfluous. As mentioned above, no one is immune from hacking neither the <em>CIA<\/em> Director nor <em>NASA<\/em>.<\/p>\n<p><em>Pictures by www.nasa.gov, www.space.com, sputniknews.com<\/em><\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Like everyone, hackers are looking for their moment of glory. Perhaps, this explains their constant interest in the well-known and big names: CIA, Pentagon, White House&#8230; And not so long ago the NASA\u2019s turn has come. Apparently, not for the first time. The group of hackers AnonSec, which includes representatives of different countries, states that [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":4514,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[202,118,166,230],"class_list":["post-1481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-cybersecurity","tag-data-protection","tag-hacking-attacks","tag-information-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=1481"}],"version-history":[{"count":7,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1481\/revisions"}],"predecessor-version":[{"id":5366,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1481\/revisions\/5366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4514"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=1481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=1481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=1481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}