Half of the world's satellite traffic is unencrypted | Kaspersky official blog
Researchers have determined that a significant portion of global satellite traffic lacks encryption. Let's delve into how data — even from your cellphone calls — can leak from orbit.
AI Analysis
Technical Summary
Recent research highlighted by Kaspersky reveals that approximately half of the world's satellite communication traffic is transmitted without encryption, creating a substantial security vulnerability. Satellite communications, which include data from cellphone calls, internet backhaul, maritime and aviation communications, and military transmissions, often rely on legacy systems or cost-sensitive implementations that omit encryption. This lack of encryption allows adversaries equipped with satellite receivers and signal processing tools to intercept and analyze sensitive data directly from orbit or ground stations. The vulnerability is systemic, affecting a wide range of satellite operators and communication providers globally. While no active exploits have been reported, the passive nature of interception means attackers can quietly collect intelligence without alerting targets. The threat compromises confidentiality primarily, as intercepted data can include personal communications, corporate data, and potentially classified information. The integrity and availability of satellite services are less directly impacted by this vulnerability. The absence of encryption is often due to technical constraints, regulatory gaps, or economic considerations. The risk is exacerbated by the increasing reliance on satellite communications for critical infrastructure and the growing sophistication of adversaries capable of satellite signal interception. The medium severity rating reflects the significant confidentiality impact and ease of exploitation balanced against the lack of active exploitation and the technical challenges in intercepting satellite signals. This issue calls for urgent attention to implement encryption standards such as AES or other robust cryptographic protocols in satellite communication links and to conduct comprehensive security assessments across satellite networks.
Potential Impact
For European organizations, the unencrypted satellite traffic vulnerability poses a serious risk to the confidentiality of sensitive communications, including governmental, military, maritime, aviation, and commercial data. Intercepted data could lead to espionage, intellectual property theft, or exposure of personal information, undermining privacy and national security. Critical infrastructure sectors that depend on satellite communications for remote connectivity or backup links may face increased exposure to data leakage. The threat also affects telecommunications providers who use satellite backhaul, potentially compromising customer data and communications. While the vulnerability does not directly impact data integrity or availability, the loss of confidentiality can have cascading effects on trust, regulatory compliance (e.g., GDPR), and operational security. European defense and aerospace sectors are particularly vulnerable given their reliance on satellite communications for command, control, and intelligence. The potential for adversaries to conduct passive surveillance from orbit or ground stations without detection increases the risk of long-term intelligence gathering against European targets. This could influence geopolitical dynamics and intelligence operations within Europe. The medium severity reflects a balance between the widespread nature of the vulnerability and the technical sophistication required to exploit it effectively.
Mitigation Recommendations
European organizations should prioritize the implementation of strong encryption protocols for all satellite communication links, including legacy systems where feasible. This includes adopting industry-standard cryptographic algorithms such as AES-256 for data in transit. Satellite communication providers must conduct comprehensive security audits to identify unencrypted traffic and upgrade their systems accordingly. Regulatory bodies in Europe should enforce stricter compliance requirements mandating encryption for satellite communications, especially for critical infrastructure sectors. Organizations should also employ signal monitoring and anomaly detection tools to identify unauthorized interception attempts or unusual traffic patterns. Collaboration between satellite operators, cybersecurity agencies, and government entities is essential to share threat intelligence and develop best practices. Investment in next-generation satellite communication technologies that inherently support encryption and secure key management is recommended. For sensitive communications, consider using additional layers of encryption at the application layer to protect data end-to-end. Training and awareness programs for stakeholders in satellite communications can help emphasize the importance of encryption and secure configurations. Finally, contingency planning should include strategies to respond to potential data leaks or interception incidents.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium
Half of the world's satellite traffic is unencrypted | Kaspersky official blog
Description
Researchers have determined that a significant portion of global satellite traffic lacks encryption. Let's delve into how data — even from your cellphone calls — can leak from orbit.
AI-Powered Analysis
Technical Analysis
Recent research highlighted by Kaspersky reveals that approximately half of the world's satellite communication traffic is transmitted without encryption, creating a substantial security vulnerability. Satellite communications, which include data from cellphone calls, internet backhaul, maritime and aviation communications, and military transmissions, often rely on legacy systems or cost-sensitive implementations that omit encryption. This lack of encryption allows adversaries equipped with satellite receivers and signal processing tools to intercept and analyze sensitive data directly from orbit or ground stations. The vulnerability is systemic, affecting a wide range of satellite operators and communication providers globally. While no active exploits have been reported, the passive nature of interception means attackers can quietly collect intelligence without alerting targets. The threat compromises confidentiality primarily, as intercepted data can include personal communications, corporate data, and potentially classified information. The integrity and availability of satellite services are less directly impacted by this vulnerability. The absence of encryption is often due to technical constraints, regulatory gaps, or economic considerations. The risk is exacerbated by the increasing reliance on satellite communications for critical infrastructure and the growing sophistication of adversaries capable of satellite signal interception. The medium severity rating reflects the significant confidentiality impact and ease of exploitation balanced against the lack of active exploitation and the technical challenges in intercepting satellite signals. This issue calls for urgent attention to implement encryption standards such as AES or other robust cryptographic protocols in satellite communication links and to conduct comprehensive security assessments across satellite networks.
Potential Impact
For European organizations, the unencrypted satellite traffic vulnerability poses a serious risk to the confidentiality of sensitive communications, including governmental, military, maritime, aviation, and commercial data. Intercepted data could lead to espionage, intellectual property theft, or exposure of personal information, undermining privacy and national security. Critical infrastructure sectors that depend on satellite communications for remote connectivity or backup links may face increased exposure to data leakage. The threat also affects telecommunications providers who use satellite backhaul, potentially compromising customer data and communications. While the vulnerability does not directly impact data integrity or availability, the loss of confidentiality can have cascading effects on trust, regulatory compliance (e.g., GDPR), and operational security. European defense and aerospace sectors are particularly vulnerable given their reliance on satellite communications for command, control, and intelligence. The potential for adversaries to conduct passive surveillance from orbit or ground stations without detection increases the risk of long-term intelligence gathering against European targets. This could influence geopolitical dynamics and intelligence operations within Europe. The medium severity reflects a balance between the widespread nature of the vulnerability and the technical sophistication required to exploit it effectively.
Mitigation Recommendations
European organizations should prioritize the implementation of strong encryption protocols for all satellite communication links, including legacy systems where feasible. This includes adopting industry-standard cryptographic algorithms such as AES-256 for data in transit. Satellite communication providers must conduct comprehensive security audits to identify unencrypted traffic and upgrade their systems accordingly. Regulatory bodies in Europe should enforce stricter compliance requirements mandating encryption for satellite communications, especially for critical infrastructure sectors. Organizations should also employ signal monitoring and anomaly detection tools to identify unauthorized interception attempts or unusual traffic patterns. Collaboration between satellite operators, cybersecurity agencies, and government entities is essential to share threat intelligence and develop best practices. Investment in next-generation satellite communication technologies that inherently support encryption and secure key management is recommended. For sensitive communications, consider using additional layers of encryption at the application layer to protect data end-to-end. Training and awareness programs for stakeholders in satellite communications can help emphasize the importance of encryption and secure configurations. Finally, contingency planning should include strategies to respond to potential data leaks or interception incidents.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/dont-look-up-satellite-eavesdropping/54709/","fetched":true,"fetchedAt":"2025-11-05T20:15:12.568Z","wordCount":2465}
Threat ID: 690bb050976718a7330913ca
Added to database: 11/5/2025, 8:15:12 PM
Last enriched: 11/20/2025, 2:28:26 AM
Last updated: 12/20/2025, 6:45:35 PM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14734: CWE-352 Cross-Site Request Forgery (CSRF) in nestornoe Amazon affiliate lite Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.