Archive for August, 2014


[NBCCHICARGO.COM] A cyber security expert tells NBC5 Investigates he has found a way to hack into the satellite communications systems used in multiple industries.

“These devices are wide open right now,” said Ruben Santamarta, a security consultant based in Madrid, Spain with IOActive.

"For the aerospace sector we can disrupt satellite communications, [and] potentially modify the data that goes through those channels," said Santamarta

“For the aerospace sector we can disrupt satellite communications, [and] potentially modify the data that goes through those channels,” said Santamarta. Image: nbcchicargo.com

Pilots, ship captains and military personnel rely on satellite networks to communicate when there are no phone lines or wireless networks available.

“If someone can see the password or that user name it’s over,” he added. “Those vulnerabilities can be exploited to remotely compromise those devices.

Santamarta said he used something called reverse engineering — or decoding — to hack satellite communications equipment used in aerospace, maritime and military industries.

“In the military sector they use satellite terminals for combat units,” said Santamarta. “They normally encrypt the radio [transmissions] they send. But we can disrupt the satellite communications channel so we can prevent combat units [from asking] for help if they are being attacked.”

And in the maritime sector, satellite communications are used to send and receive vital information that affects the safety of the crew.

“If they are being attacked by terrorists, or they are suffering fire, they can send a distress call,” he said. “But we found we can modify the firmware in some of those terminals, so we can prevent a crew from sending a distress call.”

Santamarta recently published a 25-page report and went public with his findings at Defcon 22 – the largest hacking conference in the world – held earlier this month in Las Vegas, Nevada.

“For the aerospace sector we can disrupt satellite communications, [and] potentially modify the data that goes through those channels,” said Santamarta. “In some cases you need physical access to compromise the devices we analyzed, but in other cases you can use Wi-Fi or the entertainment network to access that device.”

His research took place in a lab setting and has not been tested on an actual commercial plane. But his findings have raised concerns in the aviation industry.

Read the full story at NBCCHICARGO.OM here….

 


NBCCHICARGO.COM
21st August, 2014


 

 

 


[International Airport Review] Heathrow Airport Holdings (HAH) is reported to be planning to sell off Southampton, Glasgow and Aberdeen Airports by the end of the year.

The sale would mean that HAH, formerly British Airports Authority (BAA), would be left with just London Heathrow Airport. Photo: Wikipedia

The sale would mean that HAH, formerly British Airports Authority (BAA), would be left with just London Heathrow Airport. Reports claim that the sale would be in order to fund further development projects at the world’s third busiest airport.

A statement from HAH read: “Over recent months Heathrow Airport Holdings group shareholders and management have been considering their strategic position in relation to our three airports, Aberdeen, Glasgow and Southampton.

“As a result the group is now formally entering a sale process. While there is currently no certainty that a sale will be concluded, the group intends to work towards completing a transaction by the end of the year.”

In addition to London Heathrow, Aberdeen, Glasgow and Southampton, BAA once also owned Gatwick, Stansted and Edinburgh Airports as well, but following a performance inquiry by the Competition Commission (now the Competition and Markets Authority), BAA were ruled to sell Gatwick, Stansted and either Glasgow or Edinburgh Airports in order to break up the monopoly.

Following the ruling, Global Infrastructure Partners purchased Gatwick Airport in 2009 and Edinburgh in 2012, and Stansted was purchased by Manchester Airport Group in 2013.

 

Read the original story at International Airport Review…..

 


International Airport Review
7th August, 2014
 


 


[Euractiv.com] Russian Prime Minister Dmitry Medvedev threatened on Tuesday (5 August) to retaliate for the grounding of a subsidiary of national airline Aeroflot because of EU sanctions, with one newspaper reporting that European flights to Asia over Siberia could be banned.

Low-cost carrier Dobrolyot, operated by Aeroflot, suspended all flights last week after its airline leasing agreement was cancelled under European Union sanctions because it flies to Crimea, a region Russia annexed from Ukraine in March.

“We should discuss possible retaliation,” Medvedev said at a meeting with the Russian transport minister and a deputy chief executive of Aeroflot.

The business daily Vedomosti reported that Russia may restrict or ban European airlines from flying over Siberia on Asian routes, a move that would impose costs on European carriers by making flights take longer and require more fuel.

Vedomosti quoted unnamed sources as saying the foreign and transport ministries were discussing the action, which would put European carriers at a disadvantage to Asian rivals but would also cost Russia money it collects in overflight fees.

Shares in Aeroflot – which according to Vedomosti gets around $300 million a year in fees paid by foreign airlines flying over Siberia – tumbled after the report, closing down 5.9% compared with a 1.4% drop on the broad index.

Siberia ban would force EU carriers into costly detours

At the height of the Cold War, most Western airlines were barred from flying through Russian airspace to Asian cities, and instead had to operate via the Gulf or the US airport of Anchorage, Alaska on the polar route.

European carriers now fly over Siberia on their rapidly growing routes to countries such as China, Japan and South Korea, paying the fees which have been subject to a long dispute between Brussels and Moscow.

Vedomosti quoted one source as saying a ban could cost airlines like Lufthansa, British Airways and Air France €1 billion over three months, but industry experts said that figure was probably too high.

Avoiding Russian airspace would probably be 25-50% more expensive than paying fees for transit, said Russian aviation consultant Boris Ryabok, estimating European airlines would lose around $100-200 million per year, less than the cost to Russia of the lost fees.

Lufthansa said it operates about 180 flights a week through Siberian airspace but declined further comment, as did British Airways.

The EU has widened its sanctions after last month’s downing of a Malaysian airliner over territory in eastern Ukraine controlled by pro-Moscow rebels, with the loss of 298 lives.

 

Read the full story at Euractiv.com…..

 


Euactiv.com
6th Aug, 2014



[Government Security News] The FBI Cyber Division has warned that the Aviation industry is under continual cyber-attack. Advanced Persistent Threat (APT) actors have been sending successful spear-phishing e-mails targeting the aviation community.

The FBI assesses that APT actors target technology, best practices, and other proprietary information from victim businesses for theft.

GCR has appointed Andre Allen as its new information & cyber security manager; Allen will spearhead GCR’s Cyber Security Practice to deliver cost-effective cyber security solutions with a primary focus on the aviation industry, the company says.

Allen will lead an experienced team of certified project managers and developers, some with high level government security clearance.

Andre Allen

Andre Allen

GCR provides cyber security solutions to the aviation industry partly due to the experience the company has in providing technology solutions to large airports.

The Cyber Security Practice will leverage GCR’s security architecture, policies, technologies and processes to produce automated cyber security solutions.

GCR is currently implementing automated cyber security solutions at a major U.S. airport.

“GCR leveraged the existing partnership with the airport to collaboratively deliver cyber security solutions that address the needs and challenges faced in the aviation industry,” said Tim Walsh, director of Aviation Services for GCR.

“We are excited about having Andre on our team as he brings a wealth of information and cyber security knowledge, specifically having been an IT security leader at the NASA Johnson Space Center for the past 15 years.”


Government Security News
5th Aug, 2014



[BBC News] A man has been arrested on suspicion of making a hoax bomb threat after military jets were called to escort a passenger plane to Manchester Airport.

Officers boarded the plane and arrested a passenger. Photo: Reuters / Andrew Yates

The Qatar Airways plane was escorted in to land by the Royal Air Force (RAF) following information received by the pilot.

Greater Manchester Police said it was treating it as a “full emergency”.

Armed police boarded the Doha to Manchester plane and arrested a passenger on board. All flights in and out of the airport were suspended for about 25 minutes.

The plane involved was an Airbus A330-30, which had 269 passengers and 13 Qatar Airways crew on board. It was escorted by Typhoons from RAF Coningsby in Lincolnshire.

Operations at the airport resumed at about 14:00 BST after the plane landed at a terminal. Passengers have been disembarking from the plane “as normal”, an airport spokesman said.

Josh Hartley, who boarded the plane at Doha in Qatar, said: “Well when the escort came it was very scary – I’m pretty shook up now.”

BBC News – Photo: Reuters

 

Read the full story here at BBC News…..

plane

Photo courtesy Josh Hartley / BBC News

Full BBC News updates here…..

 


BBC News
5th Aug, 2014



[World Bulletin] Cybersecurity researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems – a claim that, if confirmed, could prompt a review of aircraft security.

“In theory, a hacker could use a plane’s onboard WiFi signal or inflight entertainment system to hack into its avionics equipment, potentially disrupting or modifying satellite communications”

Santamarta, a consultant with cybersecurity firm IOActive, is scheduled to lay out the technical details of his research at this week’s Black Hat hacking conference in Las Vegas, an annual convention where thousands of hackers and security experts meet to discuss emerging cyber threats and improve security measures.

His presentation on Thursday on vulnerabilities in satellite communications systems used in aerospace and other industries is expected to be one of the most widely watched at the conference. “These devices are wide open.

The goal of this talk is to help change that situation,” Santamarta, 32, told Reuters. The researcher said he discovered the vulnerabilities by “reverse engineering” – or decoding – highly specialized software known as firmware, used to operate communications equipment made by Cobham Plc, Harris Corp, EchoStar Corp’s Hughes Network Systems, Iridium Communications Inc and Japan Radio Co Ltd.

 

In theory, a hacker could use a plane’s onboard WiFi signal or inflight entertainment system to hack into its avionics equipment, potentially disrupting or modifying satellite communications, which could interfere with the aircraft’s navigation and safety systems, Santamarta said.

He acknowledged that his hacks have only been tested in controlled environments, such as IOActive’s Madrid laboratory, and they might be difficult to replicate in the real world.

Santamarta said he decided to go public to encourage manufacturers to fix what he saw as risky security flaws. Representatives for Cobham, Harris, Hughes and Iridium said they had reviewed Santamarta’s research and confirmed some of his findings, but downplayed the risks.

For instance, Cobham, whose Aviation 700 aircraft satellite communications equipment was the focus of Santamarta’s research, said it is not possible for hackers to use WiFi signals to interfere with critical systems that rely on satellite communications for navigation and safety.

The hackers must have physical access to Cobham’s equipment, according to Cobham spokesman Greg Caires. “In the aviation and maritime markets we serve, there are strict requirements restricting such access to authorized personnel only,” said Caires. A Japan Radio Co spokesman declined to comment, saying information on such vulnerabilities was not public.

Read the full story here…… 

 


World Bulletin 4th Aug, 2014