this post was submitted on 27 Oct 2025
95 points (99.0% liked)
Technology
76415 readers
3488 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
What confuses me is what they mean by "corporate VPN data containing unencrypted login details." Unless the VPN server connects to the backend servers with unencrypted traffic through these satellites (which definitely should not happen) then this should not be possible.
From, the paper: https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpaper.pdf
These companies are leasing these satellite links for various purposes and then transmitting their network data over the links with no encryption. You can, for about $600 and some software (https://github.com/ucsdsysnet/dontlookup) read this data.
The researchers discovered data from US Military, Walmart-Mexico, AT&T, Government of Mexico, TelMex, Grupo Santander, Intelsat, Panasonic Avionics, WiBo, KPU. The researchers disclosed the vulnerability to all of these entities between 2024 and 2025.
Someone (I don't know who but T-Mobile is the only cellular carrier in their list...) was transmitting call and text data, in plaintext:
Yah, I am sure there is a ton of unencrypted data of some form flowing, but anything end-to-end encrypted would be unreadable.
Is it even possible to configure something like wireguard so incorrectly that it's unencrypted?
I guess lots of companies still use some ancient proprietary thing
I mean US hospitals still use fax machines and banks use OTP over SMS, so all things are possible I guess.
It reads like "definitely should not happen" was indeed happening!
I wonder if some techs got a basic unencrypted test working, then a pointy haired boss moved them on to another project and it got deployed into use with no-one setting up the encryption.
More likely "encryption in satellites is expensive, so let's not do that. Pennies saved on my quarterly report, yay!".