NASA and cybersecurity: Ground control to Major Tom?

Iranian students claim to have penetrated a NASA website and stolen the personal information of thousands of NASA researchers. While NASA has not confirmed the hack, the agency has been struggling for sometime with cybersecurity.

The Iranian group calling itself the "Cyber Warriors Team" bragged about their feat in a May 16 post on Pastebin. NASA is reportedly investigating and did not answer a request for comment Wednesday.


Writing in broken English, the group, which described itself as students "organized and formed of programmers and hackers," said it hacked the secure sockets layer of the NASA site to obtain the public key certificates needed to gain access to the researchers' personal data.

The alleged compromised site is called the Solicitation and Proposal Integrated Review and Evaluation System.

In deciphering the group's Pastebin post, Kaspersky Lab said in its security blog that the students claimed to have created an HTTPS protocol scanner to find the vulnerability.

Also called a packet analyzer, the scanner intercepts and logs traffic over a digital network. By decoding the intercepted data, the hackers were apparently able to locate the certificates.

Kurt Baumgartner, senior security researcher at Kaspersky, said without proof or confirmation from NASA, the Iranians' claims are suspect. "At this point, the related Pastebin post maintains crazy talk and nothing of substance, unless NASA confirms otherwise," he told CSO on Wednesday.

Earlier this month, NASA, which stands for the National Aeronautics and Space Administration, and the European Space Agency confirmed a group calling itself "The Unknowns" had hacked sites of both agencies. No information was stolen. Instead, the group passed along details of the vulnerabilities, so they could be fixed.

In a report to Congress in February (PDF document), NASA Inspector General Paul K. Martin said the agency has increasingly become a target of sophisticated attacks bent on stealing or changing information from computer systems and networks. During fiscal year 2011, NASA was the target of 47 such attacks, with 13 successfully compromising the agency's computers.

Martin's recommendations included maintaining an up-to-date list of IT components connected to NASA's network, define security configuration baselines for each component and use best practices for vulnerability management on all its IT systems. Martin also pointed out that NASA has been slow to implement full-disk encryption of data on its employees' laptops and other mobile computing devices.

NASA's security headaches are expected to increase as it turns to cloud computing to deliver software services over the web. "The need to effectively secure agency data stored in the cloud has emerged as the major challenge to federal agencies reaping the substantial benefits cloud computing offers," Martin said.

Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts