#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Get the Free Newsletter
SaaS Security

nasa | Breaking Cybersecurity News | The Hacker News

Mayday! NASA Warns Employees of Personal Information Breach

Mayday! NASA Warns Employees of Personal Information Breach
Dec 19, 2018
Another day, another data breach. This time it's the United States National Aeronautics and Space Administration (NASA) NASA today confirmed a data breach that may have compromised personal information of some of its current and former employees after at least one of the agency's servers was hacked. In an internal memo sent to all employees on Tuesday, NASA said the unknown hackers managed to gain access to one of its servers storing the personally identifiable information (PII), including social security numbers, of current and former employees. The agency said NASA discovered the breach on October 23 when its cybersecurity personnel began investigating a possible breach of two of its servers holding employee records. After discovering the intrusion, NASA has since secured its servers and informed that the agency is working with its federal cybersecurity partners "to examine the servers to determine the scope of the potential data exfiltration and identify pot

NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean

NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean
Feb 02, 2016
Once again the Red Alarm had been long wailed in the Security Desk of the National Aeronautics and Space Administration ( NASA ). Yes! This time, a serious hacktivism had been triggered by the Hacking group named " AnonSec " who made their presence in the cyber universe by previous NASA Hacks. The AnonSec Members had allegedly released 276 GB of sensitive data which includes 631 video feeds from the Aircraft & Weather Radars; 2,143 Flight Logs and credentials of 2,414 NASA employees, including e-mail addresses and contact numbers. The hacking group has  released a self-published paper named " Zine " that explains the magnitude of the major network breach that compromised NASA systems and their motives behind the leak. Here's How AnonSec Hacked into NASA The original cyber attack against NASA was not initially planned by AnonSec Members, but the attack went insidious soon after the Gozi Virus Spread that affected millions of systems a

How Nation-State Actors Target Your Business: New Research Exposes Major SaaS Vulnerabilities

How Nation-State Actors Target Your Business: New Research Exposes Major SaaS Vulnerabilities
Feb 15, 2024SaaS Security / Risk Management
With many of the highly publicized 2023 cyber attacks revolving around one or more SaaS applications, SaaS has become a cause for genuine concern in many boardroom discussions. More so than ever, considering that GenAI applications are, in fact, SaaS applications. Wing Security (Wing), a SaaS security company, conducted an analysis of 493 SaaS-using companies in Q4 of 2023.  Their study reveals  how companies use SaaS today, and the wide variety of threats that result from that usage. This unique analysis provides rare and important insights into the breadth and depth of SaaS-related risks, but also provides practical tips to mitigate them and ensure SaaS can be widely used without compromising security posture.  The TL;DR Version Of SaaS Security 2023 brought some now infamous examples of malicious players leveraging or directly targeting SaaS, including the North Korean group UNC4899, 0ktapus ransomware group, and Russian Midnight Blizzard APT, which targeted well-known organizat

Worldview-3 — Satellite That Could Allow Google and U.S Government to See Your Face from Space

Worldview-3 — Satellite That Could Allow Google and U.S Government to See Your Face from Space
Aug 13, 2014
Majority of my articles are related to government spying, privacy and security issues of your online stuffs and also measures that you can adopt in protecting yourself from being spied on. But, your all efforts will soon be of no use - someone is about to secretly track your every footstep. Google will soon get an eye in the space that will be enough powerful to see your face, thanks to the new satellite, WorldView-3 satellite, which is scheduled to launch later today (11:30 a.m. PST) from California's Vandenberg Air Force Base atop an Atlas 5 rocket by Lockheed Martin Commercial Launch Services, according to Motherboard . DIGITAL EYE IN SPACE WorldView-3 satellite is developed by a US-based company DigitalGlobe , one of the world's leading global content providers of high-resolution earth imagery, supplying most online mapping services to the US government and NASA. The satellite contains : Exelis-built 1.1 meter aperture telescope  Primary visible/SWIR sensor B

Are You Vulnerable to Third-Party Breaches Through Interconnected SaaS Apps?

cyber security
websiteWing SecuritySaaS Security / Risk Management
Protect against cascading risks by identifying and mitigating app2app and third-party SaaS vulnerabilities.

NASA 'Space your Face' domain hacked

NASA 'Space your Face' domain hacked
Jan 07, 2013
Another basic security loop-hole in NASA website lead to a Hack. This time hacker going by name " p0ison-r00t " deface a sub domain of NASA ( https://spaceyourface.nasa.gov/ ). The hacked sub domain running a web application using flash, that allow visitors to create some funny videos of Space using Faces. Hacker able to upload his text on the website, as shown in screenshot taken by ' The Hacker News '. We contact hacker to know more about the hack, on asking How ? Hacker said," I found a form on website, accepting file upload but without validating the extension, that allow me to upload a php shell on server ". Hacker also said that because of low privileges he was not able to modify any file, but was able to upload some text on the website, Check here . Mirror of hack also available on Zone-h .

NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)

NASA Jet Propulsion Laboratory Vulnerable to Cross Site Scripting (XSS)
Oct 27, 2012
Yesterday, we report about the security breach in US Government computers belongs to NASA  restricted area website and Hacker dump out the complete source code and files from server of the website. Today another hacker claim a quick XSS (Cross site scripting) Vulnerability in NASA's Jet Propulsion Laboratory website (https://onearth.jpl.nasa.gov/) via a pastebin note. Hacker is going by name " Antraxt Hacker " and said about vulnerability exposure that,"I just want to proof that NASA is and never will be secured as human kind thinks they are". The xss vulnerable link is disclosed in pastebin note. I feel this not a offensive hack by hacker, even NASA should take advantage of free of cost Penetration testing services from individual like , who even not looking for Bug Bounties.

Hacker leaks source code of NASA website belongs to US Government computer

Hacker leaks source code of NASA website belongs to US Government computer
Oct 26, 2012
A Hacker going by name - " LegitHacker97 " claiming that he successfully access a NASA subdomain website , that actually belongs to a US Government computer, as mentioned on homepage. ***** WARNING ***** This is a US Government computer Hacker also dump a  82.51 MB (compressed or 337 MB uncompressed) Archive five days ago on internet, includes the complete source code of the website (in ASP). After watching the pastebin note , we tried to contact the hacker for collecting more information about the hack. Hacker describe The Hacker News via mail that," This was hacked by a major LFI vulnerability which allowed me to upload my own shell (backdoor to the site) and I took advantage of it by downloading all off the website ! ". He add ," But now vulnerability is fixed ". I download the dump from the link posetd by hacker in pastebin note and tried to match the files with NASA website and subdomains, and found that these file actually belo

Another hope in Hacker Gary McKinnon extradition

Another hope in Hacker Gary McKinnon extradition
Oct 13, 2012
Gary's 10 years spent living on a knife-edge has been nothing short of cruel and unnecessary punishment. There is another new hope for Gary McKinnon who is fighting extradition after being accused of hacking US military computers. Computer hacker Gary McKinnon will win his 10-year legal battle against extradition have been significantly raised after Home Office-appointed psychiatrists warned that he would be very likely to attempt suicide if sent for trial in the US. It comes as the result of a medical report by two Home Office psychiatrists, which found there is a "significant risk" of suicidal behaviour by Mr McKinnon. The Home Secretary will tell MPs of her final decision on the case on Tuesday. McKinnon's mother, Janis Sharp, has called on government figures to honour their promises to save her son. But despite this it remains unclear if the Home Secretary, Theresa May, will halt his extradition or not, having previously put it on hold to consider new evidence. McKin

TinKode sentenced by a Romanian court and $120000 Fine

TinKode sentenced by a Romanian court and $120000 Fine
Oct 05, 2012
" Cernaianu Manole Razvan " akka TinKode , the Romanian behind attacks against NASA, Oracle, the Pentagon, and U.S. Army, was sentenced this week to a two-year suspended sentence, according to local media reports and was ordered to pay damages totalling more than US$120,000. He was arrested in January for his part in a number of attacks. According to Cernianu's case file summary on the Romanian Ministry of Justice Web portal, he was sentenced on September 26 and received six prison sentences of one or two years for separate computer-related offenses. The offenses included: gaining unauthorized access to a protected computer system; transferring data from a computer system without authorization; affecting the normal operation of a computer system by deleting, modifying or sending electronic data; creating, selling or distributing a devices or a computer program designed to be used in computer crimes; creating, selling or distributing a password or access cod

100k IEEE site Plain-Text Passwords found on Public FTP

100k IEEE site Plain-Text Passwords found on Public FTP
Sep 25, 2012
A Romanian researcher - Radu Drăgușin  found that 100000 usernames and passwords of the Institute of Electrical and Electronics Engineers (IEEE) was stored in plaint-text on a publicly accessible FTP server. According to him, on Sept. 18 he first discovered a log with usernames and passwords in plaintext, publicly available via IEEE's FTP server for at least a month. He informed them of his find yesterday, and evidently the organization is addressing the issue. On the FTP server, according Dragusin were the logfiles for the offers and ieee.org spectrum.ieee.org - Total data to approximately 376 million HTTP requests. Including 411,308 log entries with login and password in plain text. Among the users who's information was exposed are researchers at NASA, Stanford, IBM, Google, Apple, Oracle and Samsung. IEEE's membership of over 340,000 is roughly half American (49.8 percent as of 2011). " IEEE suffered a data breach which I discovered on September 18. For a few da

NASA SSL Digital Certificate hacked by Iranian Hackers

NASA SSL Digital Certificate hacked by Iranian Hackers
May 23, 2012
NASA SSL Digital Certificate hacked by Iranian Hackers Iranian hackers ' Cyber Warriors Team ' announced in an online post that it compromised an SSL certificate belonging to NASA and subsequently accessed information on thousands of NASA researchers. A space agency representative revealed that they're currently investigating the incident. The group said the certificate was compromised by exploiting an existing vulnerability within the portal's login system, but they didn't outline the entire attack. Once they had control over the certificate, they claim to have used it to "obtain User information for thousands of NASA researcher With Emails and Accounts of other users [sic]." " These incidents spanned a wide continuum from individuals testing their skill to break into NASA systems, to well-organized criminal enterprises hacking for profit, to intrusions that may have been sponsored by foreign intelligence services seeking to further their countries' objectives, " Paul K.

Hacker claims to hack European Space Agency, NASA, US Air Force and Military, French Ministry of Defence

Hacker claims to hack European Space Agency, NASA, US Air Force and Military, French Ministry of Defence
May 02, 2012
Hacker claims to hack  European Space Agency , NASA, US Air Force and  Military , French Ministry of Defence Hackers with group name " The Unknowns " claimed to Hack European Space Agency, NASA, US military, US Air Force, Harvard.Renault Company, French Ministry of Defence, Bahrain Ministry of Defecene and Thai Royal Navy and Many more. Lots of Data, Screenshot and Login Credentials exposed via a Pastebin Notes : Part 1 and Part 2 . Hackers comment on these hacks " We have hacked this with a reason.The security of those important sites are low.It was very easy to infiltrated the sites.We hope the sites will improve their defence. " Full Message Posted by Hackers: We are The Unknowns; Our Knowledge Talsk and Wisdom Listens... Victims, we have released some of your documents and data, we probably harmed you a bit but that's not really our goal because if it was then all of your websites would be completely defaced but we know that within a week or two, the

Anonymous vs Britain's Home Office - Operation Trial At Home

Anonymous vs Britain's Home Office - Operation Trial At Home
Apr 09, 2012
Anonymous vs Britain's Home Office - Operation Trial At Home As announced during last days Anonymous has launched a Distributed Denial of Service (DDoS) against several UK government websites. A massive recruiting campaign is started on social media, a call to arm to protest the extradition of U.K. citizens to the United States. The Operation named " Operation Trial At Home ," fight the European Arrest Warrant (EAW) that could lead to the extradition of three accused criminals by the U.K.'s Home Office, the government department responsible for domestic security. Anonymous has provided Home Office's IP address in its announcement to the supporters, Scheduling for April 7 the a DDoS ( with denial-of-service) attacks against the Home Office's website. During the week I wrote and article on the intent of the famous group of hacktivist and on the possible reasons of the action. The attacks have mainly two motives: to protest against the extradition of Gary McKinnon, Christopher H

NASA sub-domain and Australian Police targeted by Hackers

NASA sub-domain and Australian Police targeted by Hackers
Mar 20, 2012
NASA sub-domain and Australian Police targeted by Hackers Hacker with name " Black Jester " hack another subdomain (  https://airtrafficconflictresolutions.arc.nasa.gov )   of  NASA. Hacker compromise the database of site and leak password hashes of Users and Database Info also. The leaked info posed on Pastebin Note . In Another Attack, Hacker - S3rver.exe managed to breach the official website of the International Police Association of Australia (ipa-australiapolice.com.au). A Pastebin paste made by the hackers contains the site's database structure along with names, usernames, email addresses and password hashes, Softpedia Reported. The hackers claim that they have warned International Police Association representatives that the site contains some serious vulnerabilities, but apparently they did nothing to secure it. The hackers also tried to root the servers, but apparently it can't be rooted.

Philips Electronics got hacked, Database Stolen by Hackers

Philips Electronics got hacked, Database Stolen by Hackers
Feb 13, 2012
Philips Electronics got hacked, Database Stolen by Hackers Another big site got hacked today, its Philips Electronics - had revenues of €25.42 billion in 2010, making it one of the largest electronics companies in the world. It employs around 114,500 people across more than 60 countries. The deface page shows the name of Hacker as -  Hacked by bch195 and HaxOr . These hackers belongs from  Team INTRA . Hacker also make a pastebin note ( https://pastebin.com/BDbrcx8b ) about hack. Hacker claim to hack many subdomains of Philips websites as shown. The screenshot is of a php shell uploaded on Philips's Website. Hackers link 3 more Private note in last pastebin note, which include Most of the Hacked Database of Website and List of few emails extracted from their. Also hacker comment that " This is first 100 emails from 200k list.I don't want to share more because i will sell it ." Last week seems to have another interesting Hacks of big websites : "NASA Own

"NASA Own3d Again" - NASA Database Leaked by r00tw0rm

"NASA Own3d Again" - NASA Database Leaked by r00tw0rm
Feb 12, 2012
" NASA Own3d Again " - NASA Database Leaked by r00tw0rm Hackers from Team  r00tw0rm again hit NASA . According to Latest tweet by Hackers,  They claim to hack the one of the Sudomain of Nasa (Link is not exposed by hackers and claimed to be reported for Fix). Hackers claim to hack GB's of database and they  Leaked sample of database include Users names, emails and Passwords , Contact as shown: Same Hackers Yesterday Hack and Expose the Database of United States Census Bureau and Vulnerable link was also Exposed.

Hackers Claims to compromise Intel's Sensitive Data

Hackers Claims to compromise Intel's Sensitive Data
Feb 10, 2012
Hackers Claims to compromise Intel 's Sensitive Data A security researcher under the name of " WeedGrower ", or " X-pOSed " has been on a roll since the start of 2012. He has ambushed huge sites such as AOL, NASA, Hotmail, Myspace, Xbox, USBank, Yahoo, and VISA, he has also leaked sensitive data on most of those websites. Hackers today Claiming that he compromise Intel's Sensitive Data like User Base & Credit Cards. He found a way to expose sensitive data via the subscriber section on Intel.com and he also has access to the INTEL.com database which reveals Credit Card Numbers, Social Security Numbers, Emails, Passwords, and more. "WeedGrower", or "X-pOSed" has threatened that he's going to be leaking this soon if he doesn't get a response from Intel.com carriers. Hacker said ," I've got to give some applause to all these pseudo-security technicians out there. I cut Intel a break, I have access to a database and a

NASA and Pentagon Hacker - TinKode Arrested in Romania

NASA and Pentagon Hacker - TinKode Arrested in Romania
Feb 02, 2012
NASA and Pentagon Hacker - TinKode Arrested in Romania Romanian police have arrested a man believed to be TinKode, the notorious hacker responsible for several daring, high-profile cyberattacks, including last year's breach of NASA's servers , Royal Navy, The European Space Agency and MySQL.com. The 20-year-old man, named as Razvan Manole Cernaianu , allegedly attacked Pentagon and NASA computer systems, revealed security holes, and published information about SQL injection vulnerabilities he had discovered, the Romanian Directorate for Investigating Organized Crime and Terrorist (DIICOT) said in a press release . He also posted a video on his blog demonstrating an attack he carried out against the U.S. government, and created and offered for sale a computer program used to hack Web sites. Through his exploits, Cernaianu blocked access to systems and seriously disabled their proper functioning, authorities said. Currently, Cernăianu is being taken to Bucharest

Hey @BarackObama ! Please don't extradite Gary McKinnon, CC : @Number10gov

Hey @BarackObama ! Please don't extradite Gary McKinnon, CC : @Number10gov
Jan 08, 2012
Hey @BarackObama ! Please don't extradite Gary McKinnon Gary McKinnon,  a Scottish systems administrator and hacker who has been accused of what one U.S. prosecutor claims is the " biggest military computer hack of all time " by hacking into the Pentagon, faces an ordeal of terrifying brutality if he is extradited to the United States. America wants to put him on trial, and if tried there he could face 60 years behind bars. Note : Request to Every Reader ! Please Re-Tweet/Share this article if you want to Support Gary McKinnon in the fight for justice. The mother Gary McKinnon has called for her son to stand trial in Britain claiming attempts to extradite him to the US have destroyed his life. He claims his motivation, drawn from a statement made before the Washington Press Club on 9 May 2001 by " The Disclosure Project ", was to find evidence of UFOs, antigravity technology, and the suppression of " free energy ", all of which he claims to have

Operation Ghost Click by FBI - Online advertising scam taken Down

Operation Ghost Click by FBI - Online advertising scam taken Down
Nov 10, 2011
Operation Ghost Click by FBI - Online advertising scam taken Down A gang of internet 'cyber bandits' who stole $14 million after hacking into at least 4 million computers in an online advertising scam have been arrested following a joint investigation by the FBI and Nasa. Six men are in custody in Estonia, pending extradition to the United States, following a two-year investigation into an " intricate international conspiracy " that " hijacked " millions of computers around the world and stole more than US$14-million. The FBI's two-year investigation was dubbed "Operation Ghost Click". Computers in more than 100 countries were infected by the "DNSChanger" malware, which redirected searches for Apple's iTunes store to fake pages pretending to offer Apple software for sale, as well as sending those searching for information on the U.S. Internal Revenue Service to accounting company H&R Block, which allegedly paid those behind the scam a fee for each visitor

German Researchers Break RFID Smartcard Encryption

German Researchers Break RFID Smartcard Encryption
Oct 11, 2011
German Researchers Break RFID Smartcard Encryption Scientists have found a way to circumvent the encryption used to protect a smartcard used to restrict access to buildings and to process public transit system payments. A team of German scientists have demonstrated a hack that lets them make a perfect clone of the kind of magnetic security card used to give access to workers in corporate or government buildings -- including NASA -- and as a daily ticket replacement on buses and subways. The same team broke a previous version of contactless-ID cards from Mifare in 2008.  This prompted the company to upgrade its security to create a card able to be programmed only once and which contained a unique identifying number that could be checked against the programmed content on the card for extra security. The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeated m
Cybersecurity Resources