{"id":81563,"date":"2025-10-17T22:03:13","date_gmt":"2025-10-17T22:03:13","guid":{"rendered":"https:\/\/www.newsbeep.com\/il\/81563\/"},"modified":"2025-10-17T22:03:13","modified_gmt":"2025-10-17T22:03:13","slug":"researchers-find-mexican-satellite-data-is-unencrypted-hackable","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/il\/81563\/","title":{"rendered":"Researchers find Mexican satellite data is unencrypted, hackable"},"content":{"rendered":"<p>Using inexpensive equipment installed on a rooftop in San Diego, computer scientists from two universities in the United States were able to observe unencrypted satellite data belonging to the Mexican government and military and several Mexican companies.<\/p>\n<p>The scientists from the University of California, San Diego (UCSD), and the University of Maryland (UMD), detailed the findings of their study of geostationary satellites in a paper published this week under the title \u201c<a href=\"https:\/\/satcom.sysnet.ucsd.edu\/docs\/dontlookup_ccs25_fullpaper.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Don\u2019t Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites<\/a>.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-610208\" src=\"https:\/\/www.newsbeep.com\/il\/wp-content\/uploads\/2025\/10\/GtmIFdMa0AIsq4D-1.jpeg\" alt=\"rooftop\" width=\"850\" height=\"569\"  \/>Much of the observation for the research was made from a simple rooftop in San Diego, California. (@Mortyzhang0311\/onX)<\/p>\n<p>\u201c<a href=\"https:\/\/www.techtarget.com\/searchmobilecomputing\/definition\/geostationary-satellite\" target=\"_blank\" rel=\"noopener nofollow\">GEO satellites<\/a> have been shown to be particularly susceptible to interception attacks,\u201d the scientists wrote.<\/p>\n<p>\u201c\u2026 Given that any individual with a clear view of the sky and US $600 can set up their own GEO interception station from Earth, one would expect that GEO satellite links carrying sensitive commercial and government network traffic would use standardized link and\/or network layer encryption to prevent eavesdroppers,\u201d they wrote.<\/p>\n<p>The six scientists from UCSD and UMD found that wasn\u2019t the case in their \u201cscan of IP traffic on 39 GEO satellites across 25 distinct longitudes with 411 transponders.\u201d<\/p>\n<p>In <a href=\"https:\/\/satcom.sysnet.ucsd.edu\/\" target=\"_blank\" rel=\"noopener nofollow\">a summary of their work<\/a>, they said that \u201ca shockingly large amount of sensitive traffic is being broadcast unencrypted, including critical infrastructure, internal corporate and government communications, private citizens\u2019 voice calls and SMS, and consumer Internet traffic from in-flight wifi and mobile networks.\u201d<\/p>\n<p>If you are an electricity customer in Mexico, there is a chance that your name, address and account number were observed by the UCSD and UMD computer scientists during their seven-month study in 2024 and early 2025.<\/p>\n<p>While the study carried out by the U.S.-based scientists didn\u2019t have malicious intent, their work shows that people who do have such intent could access sensitive government, company and personal data using affordable technology, provided they have the necessary technical know-how.<\/p>\n<p>\u201cIn this work, we demonstrate the feasibility of an attacker whose goal is to observe satellite traffic visible from their position by passively scanning as many GEO transmissions from a single vantage point on Earth as possible,\u201d the scientists wrote.<\/p>\n<p>\u201cThis form of widescale interception has previously been assumed to only be feasible with state actor-grade equipment and software. More precisely, we demonstrate that a low-resource attacker, using COTS [commercial off-the-shelf], low-cost equipment can reliably intercept and decode hundreds of links from a single vantage point,\u201d they said.<\/p>\n<p>The computer scientists\u2019 GEO interception station setup included a $180 satellite dish, a $195 dish motor, a $230 USB tuner card and other inexpensive \u201cmiscellaneous components.\u201d<\/p>\n<p>Mexican government and military data intercepted\u00a0<\/p>\n<p>The scientists used what they called \u201clow-cost consumer-grade satellite equipment\u201d to \u201ccomprehensively survey GEO satellite usage\u201d from a UCSD building in La Jolla, an upper-income neighborhood in San Diego.<\/p>\n<p>They said that they \u201cobserved unencrypted satellite traffic belonging to government and military for multiple countries,\u201d including Mexico and the United States.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-610209\" src=\"https:\/\/www.newsbeep.com\/il\/wp-content\/uploads\/2025\/10\/Satellites-are-leaking-secrets-study-shocks.jpg\" alt=\"satellite\" width=\"850\" height=\"558\"  \/>The University of California, San Diego, publicized this explanatory image, giving the impression of how easily data can be intercepted if it\u2019s not encrypted. (UCSD)<\/p>\n<p>\u201cWe observed unencrypted satellite traffic from multiple organizations within the Mexican government, including military, law enforcement, and government agencies,\u201d the scientists wrote.<\/p>\n<p>\u201cThese unencrypted links appear to be used to connect remote command centers, surveillance outposts, and mobile units via commercial satellite backhaul.\u201d<\/p>\n<p>The scientists said they observed \u201clarge amounts of unencrypted <a href=\"https:\/\/en.wikipedia.org\/wiki\/HTTP\" target=\"_blank\" rel=\"noopener nofollow\">HTTP<\/a> traffic\u201d belonging to the Mexican government, including:<\/p>\n<p>References to military terminals, regions, and zones.<br \/>\nLaw enforcement asset inventory, personnel records, and traffic monitoring.<br \/>\nIncident reporting, case tracking, and evidence documentation by field personnel and administrative staff, including narcotics activity.<br \/>\nMilitary asset tracking records for aircraft, sea vessels, armored vehicles, and LIDAR and RADAR, including data on locations, deployments, mission roles, and maintenance logs.<br \/>\nReal-time military object telemetry with precise geolocation, identifiers, and live telemetry.<\/p>\n<p>Data from CFE, Walmart M\u00e9xico, Telmex, Banorte, Banj\u00e9rcito and AT&amp;T M\u00e9xico also observed\u00a0<\/p>\n<p>In their paper, the UCSD and UMD scientists also said that they had observed data from a number of Mexican companies, including the state-owned Federal Electricity Commission (CFE) and the bank Banorte.<\/p>\n<p>CFE<\/p>\n<p>The scientists said they \u201cobserved one transponder carrying unencrypted CFE internal communications.\u201d<\/p>\n<p>The communications they saw included \u201cresponses for customer service and maintenance work orders with locations, urgency levels, and customer names, addresses, account numbers, and tariff types.\u201d<\/p>\n<p>Walmart M\u00e9xico<\/p>\n<p>The scientists said they identified \u201cthree satellite beams carrying unencrypted Walmart M\u00e9xico internal system traffic that could be received across North America.\u201d<\/p>\n<p>Among the \u201cnotable internal network traffic\u201d they observed were unencrypted logins to Walmart M\u00e9xico\u2019s inventory management system and unencrypted internal corporate emails.<\/p>\n<p>Santander M\u00e9xico, Banj\u00e9rcito and Banorte<\/p>\n<p>The scientists also intercepted and observed unencrypted data from these three financial institutions. Santander and Banorte are large commercial banks while <a href=\"https:\/\/www.gob.mx\/banjercito\" rel=\"nofollow noopener\" target=\"_blank\">Banj\u00e9rcito<\/a> is a bank affiliated with the Mexican military.<\/p>\n<p>In the case of Santander, the scientists said they observed unencrypted traffic related to ATM infrastructure.<\/p>\n<p>In the case of Banj\u00e9rcito and Banorte, the scientists said they identified \u201cextensive unencrypted satellite traffic linked to the internal infrastructure of both banks being transmitted.\u201d<\/p>\n<p>They didn\u2019t specifically mention that they were able to see personal and account data of customers of the three banks.<\/p>\n<p>AT&amp;T M\u00e9xico<\/p>\n<p>The scientists said they observed \u201cunencrypted cellular backhaul traffic\u201d from AT&amp;T M\u00e9xico, including \u201cprotocol metadata and cellular network signaling protocols, and raw user Internet traffic.\u201d<\/p>\n<p>\u201c\u2026 In a 30-minute recording, we observed 710 users\u2019 phone numbers and related control and Internet traffic,\u201d they said.<\/p>\n<p>Telmex<\/p>\n<p>The scientists said their analysis \u201cidentified three satellite beams carrying unencrypted Telmex VoIP traffic,\u201d or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Voice_over_IP\" target=\"_blank\" rel=\"noopener nofollow\">Voice over Internet Protocol traffic<\/a>.<\/p>\n<p>They said they observed \u201cunencrypted satellite backhaul traffic that included the plaintext contents of user voice calls, and protocol metadata and cellular signaling protocols.\u201d<\/p>\n<p>The scientists informed the Mexican government and companies of their vulnerabilities\u00a0<\/p>\n<p>The scientists said in their paper that they disclosed the vulnerabilities that affected the Mexican government, Telmex, Grupo Santander M\u00e9xico, Banj\u00e9rcito, and Banorte to CERT-MX on April 4, 2025.<\/p>\n<p>CERT-MX is Mexico\u2019s <a href=\"https:\/\/www.gob.mx\/gncertmx?tab=%C2%BFQu%C3%A9%20es%20CERT-MX?\" target=\"_blank\" rel=\"noopener nofollow\">National Cybersecurity Incident Response Center<\/a>, which is part of the National Guard.<\/p>\n<p>The scientists said that they disclosed Walmart M\u00e9xico\u2019s vulnerabilities to that company in January and \u201chad in-depth conversations with them.\u201d<\/p>\n<p>They also said that they separately contacted Santander and AT&amp;T.<\/p>\n<p>The scientists said they were \u201conly publishing information about affected systems and naming relevant parties\u201d after the identified issues had been remediated \u201cor an industry-standard 90-day disclosure window\u201d had elapsed \u201cwithout response or justification for extending the embargo.\u201d<\/p>\n<p>In the paper\u2019s \u201cDiscussion and Conclusions\u201d section, they said that \u201cthere is a clear mismatch between how satellite customers expect data to be secured and how it is secured in practice.\u201d<\/p>\n<p>While \u201ccell phone traffic is carefully encrypted at the radio layer between phone and tower to protect it against local eavesdroppers, it is shocking to discover that these private conversations were then broadcast to large portions of the continent, and that these security issues were not limited to isolated mistakes,\u201d the scientists wrote.<\/p>\n<p>They acknowledged that there are range of \u201cimpediments to encryption\u201d on satellite data, including encryption\u2019s impact on efficiency by \u201cincurring additional bandwidth overhead costs.\u201d<\/p>\n<p>The scientists also said they had discovered that \u201cno auditing tools exist that allow vendors to audit the security of their own satellite backhaul.\u201d<\/p>\n<p>\u201cOur work has identified multiple unintentional misconfigurations among organizations who had intended to enable encryption,\u201d they wrote.<\/p>\n<p>Mexico News Daily\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"Using inexpensive equipment installed on a rooftop in San Diego, computer scientists from two universities in the United&hellip;\n","protected":false},"author":2,"featured_media":81564,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[56729,56730,2350,85,46,29629,141,145,17926],"class_list":{"0":"post-81563","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-space","8":"tag-banorte","9":"tag-cfe","10":"tag-computer-science","11":"tag-il","12":"tag-israel","13":"tag-san-diego","14":"tag-science","15":"tag-space","16":"tag-walmart"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/81563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/comments?post=81563"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/81563\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media\/81564"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media?parent=81563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/categories?post=81563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/tags?post=81563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}