Lessons Learned from the KA-SAT Cyberattack: Response, Mitigation and Information Sharing
This talk details the technical analysis and incident response efforts following the 2022 cyberattack on the KA-SAT satellite network. The attack involved unauthorized access to a VPN concentrator, followed by the deployment of a wiper binary targeting MIPS-based modems and a high-volume DHCP flood to disrupt network connectivity. The speakers highlight the importance of network segmentation, robust logging, and established public-private partnerships for effective incident response. The presentation emphasizes the necessity of understanding 'normal' network behavior to detect sophisticated, living-off-the-land style attacks.
Anatomy of a Satellite Wipe: Lessons from the KA-SAT Attack
TLDR: The 2022 attack on the KA-SAT satellite network demonstrated how easily attackers can pivot from a compromised VPN to a massive, destructive wiper campaign against embedded MIPS-based modems. By combining valid credential abuse with a high-volume DHCP flood, the attackers effectively bricked tens of thousands of terminals simultaneously. This incident serves as a critical reminder that network segmentation and rigorous monitoring of management planes are non-negotiable for any infrastructure provider.
Satellite networks are often treated as black boxes, shielded by the assumption that their proprietary protocols and physical distance provide inherent security. The KA-SAT incident shattered that illusion. It was not a sophisticated exploit against satellite-to-ground radio frequency physics. It was a textbook example of how an attacker can leverage standard IT vulnerabilities to cause catastrophic physical-layer disruption.
The Pivot: From VPN to Wiper
The attack began with unauthorized access to a VPN concentrator at a core node in Turin, Italy. The attackers did not need a zero-day vulnerability to gain this initial foothold. They used a set of compromised credentials to bypass the VPN authentication. Once inside the management network, they moved laterally to a network operations server. This server was the crown jewel for the attackers because it held the keys to the kingdom: the ability to push software updates and images to the modems.
The attackers deployed a custom wiper binary specifically compiled for the MIPS architecture used by the modems. This binary was designed to overwrite the flash memory of the devices. Once the flash was wiped, the modems were unable to boot, rendering them effectively dead. The speed of this operation was the most striking part of the research. Within 45 minutes, the attackers had successfully pushed the wiper to tens of thousands of terminals.
The DHCP Flood: Disrupting Recovery
While the wiper binary handled the destruction, the attackers used a secondary technique to ensure the network remained down: a massive DHCP flood. By overwhelming the DHCP relay and server infrastructure with over 100,000 requests in a five-minute window, they prevented any surviving or rebooting modems from obtaining an IP address.
This is a classic Denial of Service technique, but applied at a scale that crippled the entire network's ability to manage its own subscribers. For a pentester, this highlights a critical blind spot: we often focus on the vulnerability of the endpoint, but we rarely test the resilience of the supporting infrastructure—like DHCP or AAA servers—against a high-volume, automated attack. If you are testing a network, do not just look for RCE. Look for the protocols that keep the network alive and ask yourself what happens if they stop responding.
Living Off the Land in the Management Plane
One of the most sobering takeaways from this research is that the attackers did not use exotic tools. They used the network's own management tools to perform reconnaissance and execute their commands. They were "living off the land" within the management plane. They mimicked the behavior of legitimate network administrators who might log in at odd hours to perform diagnostics or push firmware updates.
This behavior is notoriously difficult to detect because it looks like normal traffic. If your monitoring tools only alert on known malware signatures or unauthorized binary execution, you will miss this. You need to establish a baseline for what "normal" administrative activity looks like. If an administrator account suddenly starts pushing a 50MB binary to 40,000 devices at 3:00 AM, that should trigger an immediate, automated response.
Hardening the Infrastructure
Defending against this level of access requires a shift in how we view management networks. They cannot be treated as trusted zones. Every connection to a management server, even from an internal IP, must be treated as potentially hostile.
- Strict Segmentation: The management plane must be physically or logically isolated from the data plane. If a VPN concentrator is compromised, it should not provide a direct path to the servers that control device firmware.
- Contextual Validation: Implement strict controls on what actions can be performed by specific accounts. An account used for network monitoring should not have the permissions to push firmware updates.
- Enhanced Logging: You need granular logs of every command executed on your network infrastructure. If you cannot reconstruct the exact sequence of commands that led to a device wipe, you are not logging enough.
The KA-SAT attack was a wake-up call for the satellite industry, but the lessons are universal. Whether you are managing a satellite network or a standard enterprise environment, the path to destruction is often paved with the same basic failures: weak authentication, lack of network segmentation, and a failure to monitor the administrative actions that define your network's health.
If you are currently performing a red team engagement, stop looking for the "cool" exploit and start looking for the "boring" administrative functions that, if abused, could take the whole system offline. The most effective attacks are rarely the ones that require a complex chain of vulnerabilities. They are the ones that use your own tools against you.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

