Malware infects space station laptops
Not the first time, says NASA; astronauts load up Norton AntiVirus
Computerworld - Malware has managed to get off the planet and onto the International Space Station (ISS), NASA confirmed today. And it's not the first time that a worm or virus has stowed away on a trip into orbit.
The attack code, which space news site SpaceRef.com identified Monday as "W32.Gammima.AG," infected at least one of the laptops used on the station, an international effort headlined by the U.S. and Russia.
National Aeronautics and Space Administration spokesman Kelly Humphries declined to identify the malware, saying only that antivirus software detected a worm on July 25.
The first public report of malware about the ISS was logged on Aug. 14. In NASA's daily status report on the station, the agency said that Sergey Volkov, the ISS commander, was "working on the Russian RSS-2 laptop" and "ran digital photo flash cards from stowage through a virus check with the Norton AntiVirus application."
A week later, on Aug. 21, Volkov "checked another Russian laptop, today RSK-1, for software virus by scanning its hard drives and a photo disk."
The next day, Volkov transmitted antivirus scanning results from the laptop to Earth, and U.S. astronaut Greg Chamitoff scanned another computer for possible infection. NASA also said in Friday's report that all laptops on board the ISS were being loaded with antivirus software.
"All A31p laptops onboard are currently being loaded with [the] latest [Norton AntiVirus] software and updated definition files for increased protection," said NASA.
W32.Gammima.AG -- the name that Symantec Corp., maker of Norton AntiVirus, gave the malware -- is a year-old Windows worm designed to steal information from players of 10 different online games, some of them specific to the Chinese market. Among the games: ZhengTu, HuangYi Online and Rohan.
The worm also plants a rootkit on the infected system and transmits hijacked data to a remote server.
Today, Humphries said that the worm poses no threat. "It was never a threat to any command-and-control or operations computer," he said. He refused to detail how the malware snuck aboard, citing "IT security issues," but other sources, including SpaceRef.com, speculated that it might have stowed away on a laptop or a flash card.
In fact, the Aug. 11 ISS log entry hinted at digital camera storage cards as a suspect.
"There have been other incidents," confirmed Humphries, who works at the Johnson Space Center in Houston. "I don't know when the first one was, but the station will have been in orbit for 10 years [come] November."
"If there is any good news at all, it's that the malware was designed to steal usernames and passwords from computer game players, not something that orbiting astronauts are likely to be spending a lot of time doing," said Graham Cluley, a senior technology consultant with Sophos PLC, in a post to that company's blog today. "After all, with a view like that, who needs to play the likes of World of Warcraft?"
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts