IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | August 10, 2018

IoT malware found hitting airplanes’ SATCOM systems

HelpNetSecurity – In 2014, IOActive researchers revealed security vulnerabilities they found in the most widely deployed satellite communications terminals and presented potential scenarios attackers could exploit once SATCOM systems have been compromised in the aviation, maritime, and military sectors. In 2018, they demonstrated that some of these theoretical scenarios are, unfortunately, still actually possible.

ARTICLE |

Warning over satellite security bugs

BBC – Satellite systems used on aircraft, ships and by the military contain bugs that could let hackers take control of them, a security researcher has warned.

The worst bugs could let attackers overcharge satellite antenna to damage the equipment or harm operators.

And others could be used to betray the exact location of military forces in crisis zones, the researcher said.

IOActive, which found the bugs, said it was working with manufacturers to harden devices against attack.

ARTICLE |

Hacking airliners: Cybersecurity expert says he found a satellite ‘back door’ into aircraft

Herald Sun – IT sounds incredible: the ability to tap into a commercial airliner’s on-board systems as it flies thousands of meters over head. But a cyber expert is telling a security conference he’s managed to do just that — hundreds of times.

ARTICLE |

Black Hat hacker says he can easily tap into planes already in the sky

New York Post – It sounds incredible: the ability to tap into a commercial airliner’s onboard systems as it flies thousands of feet overhead. But a cyber expert told a security conference he’s managed to do just that — hundreds of times.

ARTICLE | August 9, 2018

IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships

Dark Reading – Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network – and other findings – at Black Hat USA today.

BLACK HAT USA – Las Vegas – Ruben Santamarta was flying from Madrid to Copenhagen in November 2017 on a Norwegian Airlines flight when he decided to inspect the plane’s Wi-Fi network security. So he launched Wireshark from his laptop and began monitoring the network.

ARTICLE |

The Cybersecurity 202: White House’s draft order imposing sanctions for election interference lacks teeth

The Washington Post – The White House is once again trying to show it’s taking Russian election interference seriously. But its latest effort appears to be a largely toothless one.

My colleagues Shane Harris, Josh Dawsey and Ellen Nakashima reviewed a draft of an executive order that would authorize President Trump to sanction foreigners who interfere with U.S. elections. The draft is, of course, subject to change.

ARTICLE |

Hacked satellite systems could launch microwave-like attacks, expert warns

At Black Hat conference in Las Vegas, researcher says theoretical threat to ships, planes and military is ‘no longer theoretical’

The Guardian – The satellite communications that ships, planes and the military use to connect to the internet are vulnerable to hackers that, in the worst-case scenario, could carry out “cyber-physical attacks”, turning satellite antennas into weapons that operate, essentially, like microwave ovens.

ARTICLE |

Flaw in Some Satellite Communication Terminals Can Expose U.S. Troops’ Location

Government Executive – LAS VEGAS — Some satellite communication terminals that the military uses in forward-deployed locations are highly vulnerable to a pervasive flaw, according to researchers with cybersecurity company IOActive. Company officials say they are already working with the Defense Department and the vendors that produce the buggy equipment.

ARTICLE |

This Guy Hacked Hundreds Of Planes From The Ground

Forbes – Throughout November and December last year, Ruben Santamarta sat in front of his computer peeking inside the technical bowels of hundreds of aircraft flying thousands of meters above him. That included commercial aircraft operated by some of the biggest airlines in the world. He believes it may’ve been the first time anyone had hacked planes from the ground by taking advantage of weaknesses in satellite equipment.

ARTICLE |

Hackers can steal money from insecure stock trading apps, researchers warn

Sky News – Security vulnerabilities in stock trading apps could allow hackers to steal money, researchers have warned.

After testing 16 desktop applications, 30 websites, and 34 mobile apps, “major vulnerabilities” were identified which could give criminals opportunities to conduct financial espionage or take funds.

Posts pagination

Previous page Page 1 … Page 27 Page 28 Page 29 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy