Hack-A-Satellite: The hacking challenge to find vulnerabilities in satellites and space installations

The U.S. Air and Space Forces, in collaboration with the cybersecurity community, announced the launch of the second edition of the hacking event Space Security Challenge: Hack-A-Sat. As the name suggests, this is a hacking event focused on the security of spatial deployments.

In this competition, security researchers at all levels will be able to show their skills and creativity to solve all kinds of cybersecurity challenges applied to space systems, as well as show the best ways to develop protection mechanisms for these systems.

Hack-A-Sat 2 begins with a qualifying event that will take place between June 26 and 27. Teams will compete in a Jeopardy-style format, earning points based on speed and accuracy, for a chance to win one of ten prize packages that include compensation of up to $10,000.

A year ago, Hack-A-Sat managed to bring together the participation of more than 2,000 hacking teams, who were able to work together to solve the multiple challenges set by the event organizers. Among the participants in the first edition were some of the best ethical hackers in the world, who solved a complex satellite hacking challenge to define the winning team.

Satellite technology is currently vital, enabling the use of GPS systems, credit cards and military technology. For the U.S. government, it is essential that ethical hacking also encompass intelligence and protection activities against all kinds of cyberattacks.

Lt. General John F. Thompson, commander of the U.S. Space Force’s Center for Missile Systems and Space, says: “Safety and our orbiting systems are an absolute necessity as we seek to ensure the peaceful development of space’s global common assets in the coming decades. This requires a multitude of specialties, so partnerships across the spectrum of professional cybersecurity are vital to developing the next generation of secure space systems.”

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.