Researcher hacks Elon Musk's Starlink system with $25 homemade device

Authored by business-standard.com and submitted by Charming-Cattle8805
image for Researcher hacks Elon Musk's Starlink system with $25 homemade device

A cyber-security researcher has hacked the Elon Musk-run Starlink satellite-based internet system by using a $25 homemade device.

Belgian security researcher Lennert Wouters revealed the first-ever of Starlink's user terminals or dishes located at homes and buildings.

At the Black Hat security conference in Las Vegas in the US, Wouters successfully hacked the Starlink internet system using a homemade circuit board or modchip that cost around $25 to develop, reports Wired.

Wouters revealed a voltage fault injection attack on a Starlink User Terminal (UT), that allowed him to break into the dish and explore the Starlink network.

He developed the modchip using low-cost, off-the-shelf parts and was able to use it to obtain root access "by glitching the Starlink UT security operations centre bootrom", according to a tweet previewing the presentation that he said was sent through a rooted Starlink UT.

"Our attack results in an unfixable compromise of the Starlink UT and allows us to execute arbitrary code. The ability to obtain root access on the Starlink UT is a prerequisite to freely explore the Starlink network," according to the security researcher.

Wouters revealed the vulnerability to SpaceX through its bug bounty programme.

Since 2018, Musk's Starlink has launched more than 3,000 small satellites into orbit to provide internet in remote locations. Starlink is SpaceX's low Earth orbit constellation.

Starlink's UT is one of three core components of the Starlink system; the other two are the satellites and gateways that transmit connections up to the satellites.

Musk in May said that Russia is ramping up their efforts to jam Starlink internet service in Ukraine.

He noted that Starlink has so far thwarted all cyberattacks coming from Russia.

d4rkskies on August 13rd, 2022 at 13:13 UTC »

Lots of hyperbole here. Wired’s report is far more accurate and includes links to GitHub etc, however the researcher is not making a full disclosure.

Although he managed to root the device using a modchip, this does not mean he could attack the network, satellites etc. he can learn more about how the devices communicate with backend servers and try to find exploits there, but it doesn’t give him access or ability to attack the network or infrastructure.

smacksaw on August 13rd, 2022 at 10:23 UTC »

So if I understand this rather unsophisticated article correctly, this really allows the end-user to have more control over their terminal and possibly see other devices as peers on the network.

And if I understand this correctly, if I have a public printer and it's not firewalled/private networked, someone could print shit out.

iamnotbillyjoel on August 13rd, 2022 at 10:14 UTC »

the hack executes arbitrary code on a starlink user terminal using a mod chip