Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
NASA Security Space Science

Hack Targets NASA's Earth Observation System 45

Gunkerty Jeb writes "A hacker is claiming that a security hole in a server at NASA's Goddard Space Flight Center has exposed data related to a satellite-based Earth observation system used to aid in disaster relief. The hacker, who uses the handle 'Tinkode,' has published a screen capture from what he claims is an FTP (File Transfer Protocol) server at NASA's Goddard Center. The hack comes exactly a month after the same hacker exposed a similar hole in a server operated by the European Space Agency."
This discussion has been archived. No new comments can be posted.

Hack Targets NASA's Earth Observation System

Comments Filter:
  • Somebody is running an FTP server on a computer that has a screen? Also, the obligatory "SFTP Motherfucker! Why don't you use it?"
    • by jhoegl ( 638955 )
      FTPS... where security comes after the protocol.
    • Re: (Score:2, Funny)

      by Anonymous Coward

      Jules Winnfield: What do NASA computers look like?
      Brett: What?
      Jules Winnfield: What OS do they run?!?
      Brett: What?
      Jules Winnfield: What ain't no OS I ever heard of!! They have SFTP on What?!?
      Brett: What?
      Jules Winnfield: SFTP Motherfucker! Do they use it?!?
      Brett: Yes!
      Jules Winnfield: Then you know what I'm transferring?!
      Brett: Yes!
      Jules Winnfield: Describe what NASA computers look like!!

  • Dumbing down (Score:3, Insightful)

    by Anonymous Coward on Wednesday May 18, 2011 @09:46AM (#36165052)

    When FTP needs to be explained on /. it's time to find another "News for Nerds" site.

    • Re:Dumbing down (Score:4, Insightful)

      by DanTheStone ( 1212500 ) on Wednesday May 18, 2011 @09:56AM (#36165210)
      It's because our submitters and editors are too lazy to write a summary, so they just copy-paste a chunk of the article (which may be intended for a less-technical audience).
    • by symes ( 835608 ) on Wednesday May 18, 2011 @09:57AM (#36165218) Journal

      I would say defining FTP is just being polite - anyone can come here and browse, some might even want to stay a little while. What's the problem?

    • by migla ( 1099771 ) on Wednesday May 18, 2011 @10:16AM (#36165434)

      I, for one, am grateful they explained the acronym, because until I read the next words, I thought NASA had a fuck-the-police server, which didn't make much sense, but that's what the kids writing/spraying FTP around here mean. Unless, of course, this is a neighbourhood of poor geeks...

    • by SETIGuy ( 33768 )

      It's understandable that it needs to be explained. Nobody except the government and anonymous FTP sites use it anymore. And nobody including the government should be using it.

      I've worked on unclassified DOD and NASA projects in the past, and FTP is the default for uploads and downloads. I've never been on a project where personnel would act on an upload without voice confirmation usually involving commands coded in the ICAO phonetic alphabet. I don't know this site, so I don't know if there's anything p

  • by digitaldc ( 879047 ) * on Wednesday May 18, 2011 @10:00AM (#36165276)
    Someone over at NASA, and government agencies in general, need to seriously step-up their security team.
    Hire people that can effectively put a system in place to secure their networks, data, and disposition of old equipment. Monitor your networks and data, put systems and people place that can predict and respond to security issues.
    My assumption is that NASA is so budget-constrained, and has so many wasteful expenditures that security gets left to the wayside and then things like this happen (if it indeed DID happen.)
    Time to abort the mission until we can verify the mission's security has not been compromised.
    • by Anonymous Coward

      Agreed. Although, someone hacking into the SERVIR computers has to be a real goddamn low-life sub-human sack of shit and should be ashamed to even post that they even attempted such a thing.

      What next assholes? Breaking into the UNICEF servers or something to delay help to needy children? Do you fucks go around kicking puppies and kittens?

      You're not "cool". You're not "l33t" or whatever the fuck you losers call yourselves.

      You wanna be "l33t" and "cool"? Invent something that helps humanity, makes a billion,

      • This is nothing new: http://en.wikipedia.org/wiki/WANK_(computer_worm) [wikipedia.org]

        For whatever reason, NASA is like flame for hacker's moths. They have interesting, groundbreaking research, a budget and lets be honest, they have things in orbit, but they aren't going to shoot you in the head like other agencies who may or may not have things up there. .

    • I thought there was a whole three letter agency (sharing many of the same letters as NASA), whose job it was to secure US government databases and communications. Maybe they're fixing things alphabetically and they're only up to the Ms.

      On the other hand, this data is on a server accessed by "scientists, educators, project managers and policy implementers to better respond to a range of issues including disaster management, agricultural development, biodiversity conservation and climate change"... with "a
    • Someone over at NASA, and government agencies in general, need to seriously step-up their security team.

      To outsiders, NASA looks like a big monolithic Government agency. The reality is that NASA is schizophrenic. It is really a collection of entities that operate at different levels of control and coordination depending on what particular issue is at hand. When you quote "Houston, we have a serious security problem", I'm inclined to point out that it isn't Houston's problem.

      Hire people that can effectively put a system in place to secure their networks, data, and disposition of old equipment. Monitor your networks and data, put systems and people place that can predict and respond to security issues.

      Sounds so easy when you put it down on paper like that.

      My assumption is that NASA is so budget-constrained, and has so many wasteful expenditures that security gets left to the wayside and then things like this happen (if it indeed DID happen.)

      I would say your assumption is mostly incorrect. It is more about NASA's burea

      • by CBM ( 51233 )

        I would also like to add that over the past ten years, "security" has gotten much much tighter at NASA. NASA has many roles that involve interfacing with the industrial community, the scientific community, and the public community at large. It is often difficult to reconcile those roles with the additional goal of "more security!" In fact, in the interests of blanket security, I would say that NASA's ability to interact with communities, and lead through good example, have been partially stifled in the n

        • I would also like to add that over the past ten years, "security" has gotten much much tighter at NASA. NASA has many roles that involve interfacing with the industrial community, the scientific community, and the public community at large. It is often difficult to reconcile those roles with the additional goal of "more security!" In fact, in the interests of blanket security, I would say that NASA's ability to interact with communities, and lead through good example, have been partially stifled in the name of security.

          That's a fair point. Security has been an even bigger issue over the past 10 years. Although unfortunately a fair amount of that effort has been around feeding the bureaucracy of compliance rather than actual technical security practices. Which is boon and bane. At least the compliance drive is pushing technical issues that in the past would be entirely ignored by some organizations within NASA.

          Another thing to mention is that often-times, large institutions like NASA are dealing with legacy systems that do not have the latest security. The common knee-jerk reaction is to say, "just upgrade it!" But the reality is that there can be knock-on effects that prevent upgrading or make it cost-prohibitive. Critical systems that have been running for years often do not have the funds or staff expertise to execute a major upgrade. But as I said, this is a problem with most large institutions, it's just that "NASA" in the title of an article makes it higher profile.

          The problem is that security impacts productivity. So much of what is done in IT is done without security i

    • Hi all; I actually work for NASA as an IT Security guy.

      While I can't answer specifics about this incident, you should remember that a great many things done by NASA are "General Science", and the data output from them is specifically and consciously made public.

      It's possible that the FTP server is meant to be serving those files "to the public".

      Why FTP instead of SFTP? Usually when you choose to make data public to the world, you don't bother implementing crypto on the data. And just because it's available via FTP for distribution, does not mean insecure FTP was used to *place* the data on the server.

      • by tyldis ( 712367 )

        And I work for a company that deals a great deal with NASA, and they are happy to lose satellite data while waiting for a replacement demodulator to pass their security scans on an internal network.

        They do make an effort, but personally I think they strive to achieve perfect security and in the process people has to poke holes in it in order to make it work :)

      • +1

        Thank you. This was my thought exactly. If it's read-only data, no problem.

        sr

  • Hack Targets NASA's Earth Observation System [...] The hack comes exactly a month after the same hacker exposed a similar hole in a server operated by the European Space Agency.

    Now _this_ is a hacker who knows how to aim high!

  • Could you please stop spamming facebook??

  • DUDE! CHECK OUT THIS FTP SERVER THAT I COULD JUST WALK INTO! OMG I HACK IT!

    ALL I HAD TO DO WAS PUT IN MY EMAIL ADDRESS AS THE PASSWORD! MY GOD I COULD HAVE PUT IN ANYTHING!

    bmo@owlcomm:~$ ftp ftp.linux.org.uk
    Connected to ftp.linux.org.uk.
    220 (vsFTPd 2.2.0)
    Name (ftp.linux.org.uk:bmo): anonymous
    331 Please specify the password.
    Password:
    230-Welcome to ZenIV
    230-
    230-The software on this site is made available for free without warranty or
    230-other right of recourse implied or otherwise. No stateme
    • Holy crap! Anonymous has hacked the kernel servers and left a backdoor?

      What FTP server will they hit next, sunsite?

    • by JWW ( 79176 )

      I have to concur with this sentiment. NASA data policy states that they give quite a bit of their data away freely.

      I appears that ASAR data is freely available. So this could be as simple as this hacker logging into the ftp server that distributes the data, which, as you've show is not exactly a "hack".

  • It seems like a sad day when a Slashdot article find it necessary to spell out what FTP stands for.

  • "he"? I'd be asking where spaceyhackerlady [slashdot.org] is and whether she's Tinkode. :)
  • So is disaster preparedness information now considered "classified" and only able to be disseminated to the highest bidder. Was Tinkode trying to show a dangerous lack of security on the part of NASA that would just allow anyone to log in and get the information needed to track tsunamis? Shouldn't this be what we want government to be doing?

  • I see that there are 30 comments on this article, but I cannot see them! Pressing "Get More Comments" does nothing, and neither does the javascript slider! Slashpot, fix your website! It's been broken for a few months, since the last update!

    Kubuntu 11.04, Firefox 4

  • What's the point of hacking NASA if you're not going to download their superTopSekreT UFO pictures? Anybody can modify an FTP login screenshot, but clear pictures of UFOs close up, now that's the money shot!

  • Well, BFD.

    This is hardly data that is soopersekret national security info.

    The ftp server is now down on that machine, but who knows. For all I can see, it may have even been open for read only anonymous ftp access and he just didn't know it for what it was.

    Otherwise he may have guessed an obscure login like "data" with password "data". Or, if it was running something unpatched from way long ago, used an existing hack. ftp buffer overflows were a dime a dozen at one point.

    Not everything is worth heavily secu

  • So I RTFS and think "Big Fucking Deal, someone can use FireFox to get into an FTP server that appears to carry data for some Earth Observation satellites. So far so BFD."

    Next BIG question is - did he have RO access, or RW access? TFS says nothing, so I RTFA - still nothing. Look at the screen shots, still nothing. Not even a claim of a RW access.

    So far, the guy has found a FTP server that looks like it contains data which is likely public domain already. BFD.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...