When Satellites Go Dark - Persistent Cyber Assaults and The Growing Blind Spot - Cyber Security News

The latest malware strain, dubbed “OrbitShade,” first appeared on security researchers’ radars in early 2025, when several commercial satellite operators reported unexplained communication interruptions and command execution failures. Recent incidents have revealed a disturbing trend of persistent threats specifically engineered to compromise satellite command and control systems, creating potentially catastrophic blind spots in global infrastructure networks. The implications extend beyond commercial inconvenience into the realm of national security, as military and intelligence communities increasingly rely on the same satellite infrastructure for critical operations. This highly specialized threat represents a significant evolution in space-based cyber warfare, targeting proprietary protocols used in satellite uplink communications with unprecedented precision. Once established, the malware creates a communication channel that operates alongside normal satellite functions, siphoning bandwidth and system resources while maintaining the appearance of normal operations. Industrial Cyber analysts from Mandiant identified the malware after observing similar patterns across multiple affected satellite networks. By intercepting legitimate command traffic, the malware injects its payload during routine update procedures, effectively establishing a backdoor that allows attackers to issue unauthorized commands or disable critical functionalities at will. The attack vector relies on exploiting authentication weaknesses in legacy command interfaces that many satellite systems still utilize. The malware exploits timing vulnerabilities in the Transmission Control Protocol (TCP) handshakes used during satellite command sessions. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. In the cold vastness of space, thousands of satellites orbit silently, providing critical infrastructure for global communications, navigation systems, and military operations. This code snippet reveals how OrbitShade seamlessly modifies legitimate command packets while maintaining valid checksums, making the infection virtually undetectable through standard monitoring tools. Unlike previous attacks that focused on ground stations, OrbitShade directly compromises the satellite’s onboard systems through manipulated command sequences. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. This stealthy approach allows attackers to maintain long-term access to compromised systems, gathering intelligence or waiting for the optimal moment to disrupt operations.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 29 Apr 2025 09:10:27 +0000


Cyber News related to When Satellites Go Dark - Persistent Cyber Assaults and The Growing Blind Spot - Cyber Security News

10 Best Dark Web Monitoring Tools in 2025 - DarkOwl is a comprehensive dark web monitoring tool that provides organizations with real-time intelligence on emerging threats and data breaches. Recorded Future is a comprehensive dark web monitoring tool that leverages machine learning and ...
3 months ago Cybersecuritynews.com
SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles - Two prototype satellites for the Missile Defense Agency and four missile-tracking satellites for the US Space Force rode a SpaceX Falcon 9 rocket into orbit Wednesday from Florida's Space Coast. These satellites are part of a new generation of ...
1 year ago Wired.com Rocke
US launches nuke spy satellites amid Russia weapon rumors The Register - Last night's launch of six Pentagon missile-detection satellites was well timed as fears mount that Russia is considering putting nuclear weapons into space. The US Department of Defense confirmed its payload included two satellites for the Missile ...
1 year ago Go.theregister.com Rocke
When Satellites Go Dark - Persistent Cyber Assaults and The Growing Blind Spot - Cyber Security News - The latest malware strain, dubbed “OrbitShade,” first appeared on security researchers’ radars in early 2025, when several commercial satellite operators reported unexplained communication interruptions and command execution ...
6 months ago Cybersecuritynews.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
4 months ago Cybersecuritynews.com
Blind Eagle Hackers Leveraging Google Drive, Dropbox & GitHub To Bypass Security Defenses - After infection, Remcos can capture user credentials by logging keystrokes and stealing stored passwords, modify and delete files to sabotage systems or encrypt data for ransom, establish persistence through scheduled tasks and registry modifications ...
8 months ago Cybersecuritynews.com CVE-2024-43451 APT-C-36
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military, and Corporate Data - In today’s interconnected world, satellites play a crucial role in global communications, navigation, and data transmission. However, recent investigations reveal a significant cybersecurity risk: satellites are unintentionally leaking sensitive ...
4 weeks ago Wired.com
Monitoring Dark Web Threats - CISO’s Proactive Approach - By embedding these best practices into the organization’s security posture, CISOs can ensure that dark web monitoring delivers actionable insights and drives continuous improvement. As the dark web continues to evolve, CISOs must champion a culture ...
6 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
The satellites using radar to peer at earth in minute detail - Synthetic aperture radar allows satellites to bounce radar signals off the ground and interpret the echo - and it can even peer through clouds. Clouds cover around two-thirds of the world at any one time, preventing conventional satellites from ...
1 year ago Packetstormsecurity.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
6 months ago Cybersecuritynews.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
6 months ago Cybersecuritynews.com Inception
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
Tracking Everything on the Dark Web Is Mission Critical - COMMENTARYOne of the standard cybersecurity tools today is to relentlessly check the Dark Web - the preferred workplace for bad guys globally - for any hints that your enterprise's secrets and other intellectual property have been exfiltrated. It ...
1 year ago Darkreading.com Equation
APT-C-36 Hackers Attacking Government Institutions, Financial Organizations, and Critical Infrastructure - Darktrace analysts identified a significant Blind Eagle operation in late February 2025 on a Colombian customer network, where the threat actors demonstrated their ability to complete a full attack cycle within five hours. This sophisticated threat ...
4 months ago Cybersecuritynews.com CVE-2024-43451 APT-C-36
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
State-Sponsored Hacktivism Attacks on The Rise, Rewrites Cyber Threat Landscape - Cyber Security News - “What makes this campaign particularly concerning is how it combines living-off-the-land techniques with sophisticated custom code designed to operate with minimal detection footprint,” explained Maria Sanchez, Principal Threat Researcher ...
6 months ago Cybersecuritynews.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
1 year ago Helpnetsecurity.com
Satellites for quantum communications - Through steady advances in the development of quantum computers and their ever-improving performance, it will be possible in the future to crack our current encryption processes. To safeguard communications over long distances, the QUICK³ space ...
1 year ago Sciencedaily.com
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
1 year ago Esecurityplanet.com
Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware - A sophisticated new attack vector where malicious actors are hiding malware inside DNS records, exploiting a critical blind spot in most organizations’ security infrastructure. During analysis of DNS records from 2021-2022, security researchers ...
3 months ago Cybersecuritynews.com
Report: Developers are most in demand on dark web - Hacker gangs often operate like businesses - they have salaries, working hours, clients and employees. To compete in a growing market, they are constantly looking for new talent with better skill sets, and they often use the same methods as ...
2 years ago Therecord.media
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
6 months ago Cybersecuritynews.com
Blind Eagle Hackers Using Open-Source RATs & Ciphers to Hinder Static Detection - Trustwave researchers identified the threat group’s infrastructure after pivoting from Proton66-linked assets, revealing an extensive network of domains and IP addresses used to host phishing pages impersonating legitimate Colombian banks ...
4 months ago Cybersecuritynews.com APT-C-36

Cyber Trends (last 7 days)