Professional software hacker demonstrates how to hack Starlink terminals

A professional software hacker not only recently succeeded in hacking the terminals SpaceX sells customers to use its Starlink satellite internet service, he first got a bounty from SpaceX for doing so, then made his technique freely available on the web for everyone else.

[Lennert] Wouters is now making his hacking tool open source on GitHub, including some of the details needed to launch the attack. “As an attacker, let’s say you wanted to attack the satellite itself,” Wouters explains, “You could try to build your own system that allows you to talk to the satellite, but that’s quite difficult. So if you want to attack the satellites, you would like to go through the user terminal as that likely makes your life easier.”

The researcher notified Starlink of the flaws last year and the company paid Wouters through its bug bounty scheme for identifying the vulnerabilities. Wouters says that while SpaceX has issued an update to make the attack harder (he changed the modchip in response), the underlying issue can’t be fixed unless the company creates a new version of the main chip. All existing user terminals are vulnerable, Wouters says.

Starlink says it plans to release a “public update” following Wouters’ presentation at Black Hat this afternoon, but declined to share any details about that update with WIRED prior to publication.

Wouters is a researcher at the Belgian university KU Leuven.

While it can certainly help SpaceX to figure this out, by publishing the hack to the world Wouters looks like a blackmailer unsatisfied with his payoff who is now following through with his blackmail threat. One also wonders why SpaceX, as part of its bounty payment, did not require Wouters to sign a non-disclosure agreement.

Some Amazon Echo speakers can be hacked to spy on you

Some of Amazon’s Echo speakers, designed to listen and record conversations if so commanded, can be hacked to record everything and transmit those recordings remotely.

First of all, you have to have actual access to the device to mess with its hardware. Then, you have to make sure it’s either a 2015 or 2016 model, as brand new Echo versions can’t be hacked similarly.

But if these conditions are met, then a hacker can quickly take the Echo’s base apart and load on it custom firmware that will instruct it to record everything spoken around it. That data can then be sent out to a remote server. That’s what Barnes did in his security tests. Hacking a home speaker may be the best way to spy on certain targets, even if this implies infiltrating their homes to actually mess with the hardware.

This is why I want nothing to do with smart machines. The dumber the machine, the better. I see no reason for my speakers, my washing machine, my car, or my stove, to be connected the internet. All such capability provides is a way to cause problems.

Hackers demonstrate they can remotely take over moving vehicle

Does this make you feel safer? In a demonstration of the vulnerability of modern cars that are linked to the internet, two hackers took over the operation of an unmodified moving Jeep Cherokee.

A pair of Missouri-based hackers have put on an extraordinary demonstration by logging into a Jeep Cherokee remotely, while it was being driven by a Wired reporter Andy Greenberg, and systematically taking over the car’s functionality. First, they hit him with cold air through the air-con system, then they blasted Kanye West through the stereo at full volume, rendering the volume knob completely useless. They flashed up a picture of themselves on the car’s console and set the windscreen wipers going full blast, squirting cleaning fluid onto the windscreen and making it difficult to see.

But these were just warmups to the main event – next, they took over the engine and shut it off completely, leaving the driver powerless and coasting on the freeway as traffic flashed past around him. Then, once he was off the highway, they showed how they could completely disable the brakes, and take over the steering of the car – only at slow speeds and in reverse, but they’re working on unlocking new abilities every day.

This suggests to me that linking any car directly to the internet is probably a very bad idea.

“You can literally just open up your browser, go to this, and extract all this information without actually having to hack the website itself.”

“You can literally just open up your browser, go to this, and extract all this information without actually having to hack the website itself.”

Guess which website. And guess what personal and confidential information he is extracting.

Aren’t you glad the Democrats and Barack Obama built it for you?