CybersecurityNewswireScienceTechnologyWhat's Buzzing

EU Satellites Allegedly Hacked by Russian Spycraft

▼ Summary

– European security officials believe two Russian space vehicles, Luch-1 and Luch-2, have intercepted communications from at least a dozen key European satellites.
– These interceptions risk compromising sensitive information and could allow Russia to manipulate or crash the satellites.
– The Russian vehicles have shadowed European satellites more intensively over the past three years, following Russia’s full-scale invasion of Ukraine.
– The Luch vehicles position themselves to intercept data beams, and a major concern is that much of this sensitive command data is transmitted unencrypted.
– Since its 2023 launch, Luch-2 alone has approached 17 European satellites, lingering near them for weeks at a time.

European security agencies are increasingly concerned about the activities of two Russian spacecraft, identified as Luch-1 and Luch-2, which are suspected of conducting signals intelligence operations against vital European satellites. These vehicles have executed a series of risky maneuvers, positioning themselves dangerously close to key geostationary satellites that provide critical communications services across Europe, the United Kingdom, and parts of Africa and the Middle East. The persistent shadowing of these assets represents a significant escalation in space-based espionage and poses a direct threat to both data security and the physical integrity of the orbital infrastructure.

Military and civilian space authorities have been monitoring the Luch satellites for several years, noting their repeated and suspicious close approaches. Orbital tracking data and telescopic observations confirm that these Russian objects have lingered near European satellites for weeks at a time, with this activity intensifying notably over the past three years. This period coincides with heightened geopolitical tensions following Russia’s full-scale invasion of Ukraine. Since its launch in 2023 alone, the Luch-2 vehicle has made approaches to seventeen separate European satellites.

The primary suspicion is that these spacecraft are engaged in signals intelligence, or “sigint.” As explained by Major General Michael Traut, head of Germany’s space command, the behavior suggests the Luch vehicles are positioning themselves to intercept data streams. A senior European intelligence official elaborated that the likely goal is to place the Russian craft within the narrow transmission cone of data beams sent from ground stations to the satellites overhead. This positioning would allow for the potential interception of sensitive communications.

A major vulnerability exacerbating the threat is that much of the command data sent to older European satellites remains unencrypted. Many of these vital assets were launched years or even decades ago, equipped with onboard computers that lack modern encryption capabilities. This technological gap means that intercepted signals could potentially include commands used to control the satellites themselves. The concern extends beyond mere eavesdropping; officials warn that such access could theoretically allow a hostile actor to manipulate a satellite’s trajectory or, in a worst-case scenario, deliberately cause a collision.

The implications are profound, risking not only the compromise of sensitive information but also the disruption or destruction of essential space-based services. The activities of Luch-1 and Luch-2 underscore a new frontier of geopolitical rivalry, where satellites are no longer just passive infrastructure but potential targets for interception and interference. This situation has galvanized Western space and defense commands to enhance their monitoring and develop more robust protective measures for their orbital assets.

(Source: Ars Technica)

Topics

satellite interception 95% russian space vehicles 90% european security 88% signals intelligence 85% geostationary satellites 80% orbital maneuvers 78% data encryption 75% space command 70% ukraine invasion 68% satellite vulnerabilities 65%