By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Moonlighter satellite delivered into orbit, which will be hacked at DEF CON
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Moonlighter satellite delivered into orbit, which will be hacked at DEF CON
News

Moonlighter satellite delivered into orbit, which will be hacked at DEF CON

Last updated: 2023/06/08 at 12:20 AM
Security Parrot Editorial Team Published June 8, 2023
Share
SHARE

Moonlighter Satellite to be Hacked at DEF CON 2023

The DEF CON cybersecurity conference in Las Vegas, which will be held in August 2023, will be the first time a real satellite in orbit will be targeted in the annual hacking competition. Researchers will remotely hack the Moonlighter satellite, which was recently successfully delivered into orbit using the SpaceX Falcon 9. The team that discovers a way to capture the satellite will receive the main prize of $50,000.

What is the Moonlighter Satellite?

The Moonlighter is a small cubesat (PDF) weighing around 5 kilograms. When folded, it measures 34 cm x 11 cm x 11 cm, and when fully unfolded with solar panels, it measures 50 cm x 34 cm x 11 cm. The satellite was built by the federally funded The Aerospace Corporation in partnership with the US Space Systems Command and the US Air Force Research Laboratory. It will run software developed by information security and aerospace experts specifically for in-orbit cybersecurity training and exercises.

Inspired by Hack-A-Sat Competition

This project is inspired by the Hack-A-Sat competition, which has been held for four years by the US Air Force and US Space Force specialists at the annual security conference DEF CON. According to project leader Aaron Myrick of the Aerospace Corporation, Moonlighter’s goal is to take offensive and defensive cyber exercises for space systems from a laboratory environment on Earth to low Earth orbit.
In addition, the satellite is designed to withstand attempts by hacker teams competing to take control of its software without the contestants being able to damage or destroy it. “If you’re doing a hacking competition or any other cyber activity or exercise with a real craft, it’s difficult because you’re potentially compromising the mission of that craft,” Myrick says. “Therefore, we decided that if we want to do everything right, you have to build everything from scratch.”
To this end, the satellite runs software that behaves like a real on-board computer and can be subjected to multiple real attacks, allowing you to capture the satellite without harming its critical subsystems. “All this makes the cyber experiment reproducible, realistic and safe, while maintaining the health and safety of the satellite,” explains Aerospace Corp.

Hack-A-Sat Competition at DEF CON

The first test of the Moonlighter will take place in August, when it will be broken as part of the Hack-A-Sat competition in Las Vegas. The five teams that make it to the DEF CON finals will be eligible to try their hand at this area. The top three teams will receive cash prizes: $50,000 for first place, $30,000 for second place, and $20,000 for third.
The Register quoted Istari’s lead cybersecurity software engineer, James Pavur, who has competed in three previous Hack-A-Sat competitions. Pavur describes himself as a “passionate information security researcher” when it comes to finding holes in satellites.
The Moonlighter satellite is a unique project that has been designed to take offensive and defensive cyber exercises for space systems from a laboratory environment on Earth to low Earth orbit. The satellite runs software that behaves like a real on-board computer and can be subjected to multiple real attacks, allowing hackers to capture the satellite without harming its critical subsystems.
The first test of the Moonlighter will take place in August, when it will be broken as part of the Hack-A-Sat competition in Las Vegas. The five teams that make it to the DEF CON finals will be eligible to try their hand at this area. The top three teams will receive cash prizes: $50,000 for first place, $30,000 for second place, and $20,000 for third.
The Moonlighter satellite is a unique project that has been designed to take offensive and defensive cyber exercises for space systems from a laboratory environment on Earth to low Earth orbit. The satellite runs software that behaves like a real on-board computer and can be subjected to multiple real attacks, allowing hackers to capture the satellite without harming its critical subsystems.
The Aerospace Corporation, in partnership with the US Space Systems Command and the US Air Force Research Laboratory, have built the Moonlighter satellite to be used in the DEF CON 2023 hacking competition. The satellite is a small cubesat (PDF) weighing around 5 kilograms. When folded, it measures 34 cm x 11 cm x 11 cm, and when fully unfolded with solar panels, it measures 50 cm x 34 cm x 11 cm.
The Moonlighter satellite is designed to withstand attempts by hacker teams competing to take control of its software without the contestants being able to damage or destroy it. The software that runs on the satellite is developed by information security and aerospace experts specifically for in-orbit cybersecurity training and exercises. This makes the cyber experiment reproducible, realistic and safe, while maintaining the health and safety of the satellite.
The five teams that make it to the DEF CON finals will be eligible to try their hand at this area. The top three teams will receive cash prizes: $50,000 for first place, $30,000 for second place, and $20,000 for third. The Register quoted Istari’s lead cybersecurity software engineer, James Pavur, who has competed in three previous Hack-A-Sat competitions. Pavur describes himself as a “passionate information security researcher” when it comes to finding holes in satellites.
The Moonlighter satellite is an exciting project that has the potential to revolutionize the way we think about cybersecurity in space. The DEF CON 2023 hacking competition will be the first time a real satellite in orbit will be targeted, and the team that discovers a way to capture the satellite will receive the main prize of $50,000. It will be an exciting event and one that will be sure to draw the attention of the world.

Weekly Updates For Our Loyal Readers!

Security Parrot Editorial Team June 8, 2023
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?