NASA computer servers vulnerable to attack: audit

Mar 28, 2011
A man works on a computer at NASA's Jet Propulsion Laboratory (JPL) in Pasadena, California 2003. NASA's inspector general warned Monday that computer servers used by the US space agency to control spacecraft were vulnerable to cyber attack through the Internet.

NASA's inspector general warned Monday that computer servers used by the US space agency to control spacecraft were vulnerable to cyber attack through the Internet.

"We found that computer servers on NASA's agency-wide mission network had high-risk vulnerabilities that were exploitable from the Internet," inspector general Paul Martin said in an audit of NASA's network security.

"Specifically, six computer servers associated with IT assets that control spacecraft and contain critical data had vulnerabilities that would allow a remote attacker to take control of or render them unavailable," the report said.

It said a cyber attacker who managed to penetrate the network could use compromised computers to exploit other weaknesses and "severely degrade or cripple NASA's operations."

The inspector general's audit of NASA's computer security found "network servers that revealed encryption keys, encrypted passwords, and user account information to potential attackers.

"These data are sensitive and provide attackers additional ways to gain unauthorized access to NASA networks," the report said.

The inspector general warned that "until NASA addresses these critical deficiencies and improves its IT security practices, the agency is vulnerable to computer incidents that could have a severe to catastrophic effect on agency assets, operations, and personnel."

The inspector general performed the audit after NASA experienced a number of cyber intrusions that the report said resulted in the "theft of export-controlled and other from its mission computer networks."

The inspector general cited a May 2009 incident in which infected a computer system that supports one of NASA's mission networks.

"Due to the inadequate security configurations on the system, the infection caused the computer system to make over 3,000 unauthorized connections to domestic and international Internet Protocol (IP) addresses including addresses in China, the Netherlands, Saudi Arabia, and Estonia," the report said.

It said that in January 2009, cybercriminals stole 22 gigabytes of export-restricted data from a Jet Propulsion Laboratory computer system.

The inspector general recommended that NASA immediately act to mitigate risks on Internet-accessible computers on its mission networks and carry out an agency-wide IT security risk assessment.

Explore further: Tweet much to gain popularity is an inefficient strategy

add to favorites email to friend print save as pdf

Related Stories

Audit: Air traffic systems vulnerable to attack

May 06, 2009

(AP) -- The nation's air traffic control systems are vulnerable to cyber attacks, and support systems have been breached in recent months allowing hackers access to personnel records and network servers, according to a new ...

Hackers breach US air traffic control computers

May 08, 2009

Hackers broke into US air traffic control computers on several occasions over the past few years and increased reliance on Web applications and commercial software has made networks more vulnerable, according ...

Cyber criminals cloak their tracks

Feb 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are ...

NASA's beleaguered watchdog steps aside

Apr 03, 2009

(AP) -- Two weeks after three senators called for his ouster, the beleaguered NASA inspector general who came under fire from two watchdog agencies gave notice.

Recommended for you

Tweet much to gain popularity is an inefficient strategy

17 hours ago

The imbalanced structure of Twitter, where some users have many followers and the large majority barely has several dozen followers, means that messages from the more influential have much more impact. Less ...

Five ways to fight online abuse with good manners

17 hours ago

Online and social media's capacity to enable anyone to communicate their ideas and views is much celebrated. So why do so many people feel nervous about getting involved with online debate?

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.