{"id":220464,"date":"2025-12-31T20:13:08","date_gmt":"2025-12-31T20:13:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/ie\/220464\/"},"modified":"2025-12-31T20:13:08","modified_gmt":"2025-12-31T20:13:08","slug":"european-space-agency-hit-again-as-crims-claim-200-gb-haul-the-register","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ie\/220464\/","title":{"rendered":"European Space Agency hit again as crims claim 200 GB haul \u2022 The Register"},"content":{"rendered":"<p>The European Space Agency has suffered yet another security incident and, in keeping with past practice, says the impact is limited. Meanwhile, miscreants boast that they&#8217;ve made off with a trove of data, including what they claim are confidential documents, credentials, and source code.<\/p>\n<p>While the ESA said it&#8217;s aware of a security incident, it added in an X <a href=\"https:\/\/x.com\/esa\/status\/2005938460448715055\" rel=\"nofollow\">post<\/a> Tuesday that the breach may have impacted only &#8220;a very small number of external servers&#8221; used to support unclassified engineering and scientific collaboration.<\/p>\n<p>&#8220;We have initiated a forensic security analysis\u2014currently in progress\u2014and implemented measures to secure any potentially affected devices,&#8221; the ESA added. &#8220;All relevant stakeholders have been informed, and we will provide further updates as soon as additional information becomes available.&#8221;<\/p>\n<p>That&#8217;s in contrast to what one cybercriminal posted in their offer of over 200 GB of ESA data for sale on the <a href=\"https:\/\/www.theregister.com\/2025\/10\/10\/cops_seize_breachforums\/\" rel=\"nofollow noopener\" target=\"_blank\">still-not-dead BreachForums<\/a> the day after Christmas, according to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-space-agency-confirms-breach-of-external-servers\/\" rel=\"nofollow noopener\" target=\"_blank\">screenshots<\/a> grabbed from the seemingly impossible-to-kill cybercrime forum.<\/p>\n<p>According to the alleged attacker, they gained access to ESA-linked external servers on December 18, and were connected &#8220;for about a week,&#8221; during which they claim to have stolen source code files, CI\/CD pipelines, API and access tokens, confidential documents, configuration files, Terraform files, SQL files, hardcoded credentials, and a dump of &#8220;all their private Bitbucket repositories as well.&#8221;\u00a0<\/p>\n<p>We reached out to the ESA to get more information about the status of its investigation, and more specifics on what sort of servers were breached, but didn&#8217;t hear back, with an automated response informing us that the Agency&#8217;s offices are closed for the New Year holiday.\u00a0<\/p>\n<p>As noted above, this isn&#8217;t the first time the ESA has experienced a security incident, nor the first time it has said the affected systems were external to its core networks.<\/p>\n<p>The Space Agency&#8217;s online store was <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2024\/12\/26\/hackers-used-christmas-jumpers-to-attack-european-space-agency-shop\/\" rel=\"nofollow noopener\" target=\"_blank\">hit by attackers<\/a> last year shortly before the Christmas holiday, with miscreants inserting a fake payment page to nab customer info while unsuspecting users were shopping for space-themed holiday gifts. The ESA, naturally, said it&#8217;s not in charge of its own online store.\u00a0<\/p>\n<p>A trio of ESA domains was <a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/european-space-agency-hacked-staff-and-subscribers-data-exposed\" rel=\"nofollow noopener\" target=\"_blank\">compromised in 2015<\/a> via an SQL vulnerability, resulting in the theft and leak of information belonging to thousands of subscribers and some ESA staff.<\/p>\n<p>Just a few years prior to that, in 2011, the ESA was also breached, with an attacker <a href=\"https:\/\/www.theregister.com\/2011\/04\/18\/esa_hack_follow_up\/\" rel=\"nofollow noopener\" target=\"_blank\">publishing<\/a> administrator, content management, FTP login credentials, and Apache server config files online for all to see. As was the case with this latest incident and last year&#8217;s store attack, the ESA said the 2011 breach didn&#8217;t affect the Agency&#8217;s internal networks.<\/p>\n<p>Fair enough &#8211; but this sure feels like a pattern. \u00ae<\/p>\n","protected":false},"excerpt":{"rendered":"The European Space Agency has suffered yet another security incident and, in keeping with past practice, says the&hellip;\n","protected":false},"author":2,"featured_media":220465,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[61,60,82,247],"class_list":{"0":"post-220464","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-space","8":"tag-ie","9":"tag-ireland","10":"tag-science","11":"tag-space"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/220464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/comments?post=220464"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/220464\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media\/220465"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media?parent=220464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/categories?post=220464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/tags?post=220464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}