Satellite Internet Hacking: How a $75 Setup Can Intercept and Hijack Connections

Jul 15, 2012 | Anonymous

Black Hat security conference logo where satellite hacking research was presented

Satellite Internet Signals Vulnerable to Interception and Hijacking

Satellite internet brings connectivity to some of the most remote locations on Earth — desert installations, Arctic outposts, and naval vessels at sea. But the same broad signal coverage that makes satellite internet useful also creates a significant security vulnerability. Anyone within the satellite’s footprint — potentially spanning thousands of miles — can potentially intercept or manipulate the data being transmitted.

At the 2012 Black Hat security conference in Arlington, Virginia, Spanish cybersecurity researcher Leonardo Nve of security firm S21Sec demonstrated a series of techniques for exploiting satellite internet connections using equipment costing less than $75.

The Tools Required Are Remarkably Simple

Nve’s setup consisted of a Skystar 2 PCI satellite receiver card — available on eBay for approximately $30 — along with open source Linux Digital Video Broadcast (DVB) software and the network analysis tool Wireshark. With this minimal hardware and freely available software, he demonstrated capabilities that went far beyond simply intercepting satellite television signals.

During a penetration test on a client’s network, Nve showed he could intercept DVB signals to obtain free high-speed internet access, impersonate any user connecting through satellite to create an untraceable anonymous connection, and hijack DNS requests to redirect satellite internet users to fraudulent websites of his choosing.

The DNS hijacking capability was particularly concerning. By intercepting a user’s request for a website and responding faster than the legitimate internet service provider, Nve could seamlessly replace the intended destination with a malicious site designed to steal credentials or install malware — with the user having no indication anything was wrong.

Corporate and Government Networks at Risk

Beyond individual user connections, Nve demonstrated that he could hijack GRE and TCP protocol connections used by enterprises to link offices and communicate between computers and servers. This meant that corporate and government local area networks communicating via satellite were potentially accessible to anyone with basic equipment and knowledge of the technique.

Nve tested his methods on geosynchronous satellites covering Europe, Africa, and South America, but noted there was no technical reason the same approaches would not work on satellites serving any other region.

Why Satellite Signals Remain Unencrypted

The fundamental vulnerability enabling these attacks was straightforward: DVB signals were typically transmitted without encryption. According to Nve, the lack of encryption stemmed from practical and legal complications. Scrambling satellite signals would complicate data sharing between organizations and agencies. Additionally, since a single satellite signal covers multiple countries — each with potentially different laws governing cryptographic technology — implementing encryption created complex regulatory challenges that providers chose to avoid.

A Known but Rarely Discussed Problem

Nve’s presentation built on earlier disclosures of satellite security weaknesses. In 2002, a British satellite enthusiast demonstrated to the BBC that he could view unencrypted NATO video feeds from surveillance operations in the Balkans. In 2009, reporting revealed that insurgents in Afghanistan had exploited the same lack of encryption to intercept video feeds from unmanned US drone aircraft.

At the previous year’s Black Hat conference, British researcher Adam Laurie had demonstrated satellite signal interception using a DreamBox satellite receiver and Wireshark, though his setup cost approximately $750 compared to Nve’s $75 approach. Laurie had developed custom Python scripts to create three-dimensional models of satellite frequency transmissions, allowing point-and-click navigation to specific satellite feeds.

Satellite security researcher Jim Geovedi compared the state of satellite hacking to the early days of phone system exploitation. The techniques were not well protected against but were practiced by a relatively small number of people worldwide. He suggested that many researchers likely possessed similar capabilities but had kept their findings private.

The Implications for Satellite-Dependent Communications

The research highlighted a fundamental tension in satellite communications. The same properties that make satellite internet valuable — broad coverage area and the ability to reach remote locations — also make it inherently difficult to secure. Any receiver within the satellite’s coverage zone can potentially access the signal.

Nve emphasized that his demonstrations went beyond passive eavesdropping into active manipulation of connections. The ability to impersonate users, hijack sessions, and redirect traffic to fraudulent websites represented a qualitative escalation from simply intercepting data — turning satellite internet into a potential vector for espionage, identity theft, and network infiltration at a cost accessible to virtually anyone.

For organizations relying on satellite communications in sensitive environments — military operations, diplomatic missions, critical infrastructure — the research underscored the need for end-to-end encryption at the application layer, since the underlying satellite transport layer could not be assumed secure.

Related Posts

Adam Bennett Anon

Adam Bennett Anon

Anonymous radio host know as Lorax aka Adam Bennett Anon was arrested (full article). Everybody who has known Adam 'Lorax' Bennett aka Adam Bennett Anon knows he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local community as...

read more