Hackers spread viruses to satellites - exposing serious technological vulnerabilities
感谢您选择 Automatic Translation。目前,我们提供从英语到法语和德语的翻译,不久的将来还会增加更多翻译语言。请注意,这些翻译是由第三方人工智能软件服务生成的。虽然我们发现这些翻译大部分都是正确的,但并非每种情况下都完美无缺。为确保您阅读的信息正确无误,请参考英文原文。如果您发现翻译中有错误,希望引起我们的注意,请告诉我们,这将对我们大有帮助。我们一旦发现任何文字或章节有误,都会及时更正。如有任何翻译错误,请及时与我们的网站管理员联系。
Hackers managed to get into the systems of satellite operators, telecom companies and defense companies, the US based Symantec security company announced today.
According to Symantec, the hackers are based in China.
The affected parties are in the United States and Southeastern Asia, and according to Symantec, the intent seems to have been government spying, snapping up both military and civil data traffic.
What´s very unusual about this attack was that the hackers left behind a virus in systems that control satellites, which could give them the ability to move the satellites or stop the data traffic that passes through them.
The malicious software has been removed, Symantec states.
The company also says it has has shared its discoveries with authorities in the United States and relevant Southeast Asian countries.
“Disruption to satellites could leave civilian as well as military installations subject to huge (real world) disruptions,” said Vikram Thakur, technical director at Symantec. “We are extremely dependent on their functionality.”
Satellites are critical to phone links and some internet traffic as well as mapping and positioning data.
Symantec, based in Mountain View, California, described its findings to Reuters exclusively ahead of a planned public release. It said the hackers had been removed from infected systems.
Symantec said it has already shared technical information about the hack with the US Federal Bureau of Investigation and Department of Homeland Security, along with public defence agencies in Asia and other security companies. The FBI did not respond to a request for comment.
Thakur said Symantec detected the misuse of common software tools at client sites in January, leading to the campaign’s discovery at unnamed targets. He attributed the effort to a group that Symantec calls Thrip.