Skip to main content
  1. Home
  2. Computing
  3. News

NASA hacked: 500 MB of mission data stolen through a Raspberry Pi computer

Add as a preferred source on Google

The National Aeronautics and Space Administration confirmed that its Jet Propulsion Laboratory (JPL) was hacked last year, with the attacker able to steal 500 MB of data related to the space agency’s missions using a cheap Raspberry Pi computer.

The Raspberry Pi, priced at about $36 for the basic board, is one of the most versatile and understated computing platforms available in the market. The credit card-sized computer is perfect for projects such as a retro gaming station or a smart home gadgets base station, but a hacker has apparently found a twisted use for it.

Recommended Videos

NASA, in an audit report, revealed that in April 2018, JPL discovered an account that belonged to external user was compromised, and was used to steal about 500 MB of data from one of its major mission systems.

The account was compromised by a hacker who used a Raspberry Pi to gain unauthorized access to the JPL network. The attacker then took advantage of the weaknesses in the laboratory’s network to remain undetected for 10 months, stealing 23 files in the process. Two of these files contained information on International Traffic in Arms Regulations, which controls the transfer of military and space-related technology, related to the Mars Science Laboratory Mission.

The auditors discovered that users on JPL’s network were able to enter systems and applications that they were not approved to access. The system administrators also did not properly track the devices added to the network. These shortcomings allowed the hacker to deeply infiltrate the network and remain undetected for a long time.

The breach was so widespread that the Johnson Space Center, which is responsible for programs such as the International Space Station, disconnected from the gateway. The space center’s officials were concerned that the hacker might be able to move into their mission systems, which may give the attacker the ability to send malicious signals to human space flight missions.

NASA and its laboratories are lucrative targets for hackers due to the agency’s research and development, which includes patents on cutting-edge technology, information security analyst Mike Thompson told Forbes. Ethical hacker John Opdenakker, meanwhile, pondered why NASA published the audit report, when it clearly stated that there were still some “critical vulnerabilities” at JPL’s systems.

Aaron Mamiit
Aaron received an NES and a copy of Super Mario Bros. for Christmas when he was four years old, and he has been fascinated…
The Mac Pro is dead at Apple, and I’ll miss the cheese-grater powerhouse
RIP Mac Pro. The Mac Studio is taking the throne, and we're okay with that.
Electronics, Computer, Pc

Apple has officially discontinued the Mac Pro. It’s been removed from Apple’s website, and Apple has confirmed to 9to5Mac that there are no plans to release a future version. The buy page now redirects to Apple’s Mac homepage, where the Mac Pro no longer exists.

Why did Apple kill the Mac Pro?

Read more
March Madness, Revisited: The AI Model Did Well. But Mad Things Still Happen
Stills from NCAA games.

(NOTE: This article is part of an ongoing series documenting an experiment with using AI to fill the NCAA brackets and see how it fares against years of human experience. The original article is as follows.)

A week ago, I wrote about entering an NCAA tournament pool with a more disciplined process than I usually use.

Read more
A simple coding mistake is exposing API keys across thousands of websites
Security gaps that are easier to miss than you think
Computer, Electronics, Laptop

After analyzing 10 million webpages, researchers have found thousands of websites accidentally exposing sensitive API credentials, including keys linked to major services like Amazon Web Services, Stripe, and OpenAI.

This is a serious issue because APIs act as the backbone of the apps we use today. They allow websites to connect to services like payments, cloud storage, and AI tools, but they rely on digital keys to stay secure. Once exposed, API keys can allow anyone to interact with those services with malicious intent.

Read more