Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Half of the world's satellite traffic is unencrypted | Kaspersky official blog

0
Medium
Vulnerability
Published: Wed Nov 05 2025 (11/05/2025, 20:03:41 UTC)
Source: Kaspersky Security Blog

Description

Researchers have determined that a significant portion of global satellite traffic lacks encryption. Let's delve into how data — even from your cellphone calls — can leak from orbit.

AI-Powered Analysis

AILast updated: 11/05/2025, 20:15:30 UTC

Technical Analysis

Recent research highlighted by Kaspersky reveals that approximately half of the world's satellite communication traffic is transmitted without encryption, creating a significant security vulnerability. Satellite communications are widely used for various critical applications including cellular backhaul, maritime and aviation communications, emergency services, and military operations. The lack of encryption means that data transmitted via these satellites—ranging from cellphone calls to telemetry and command data—can be intercepted by adversaries equipped with relatively accessible satellite signal interception technology. This vulnerability stems from legacy satellite systems designed before modern encryption standards were prevalent, as well as inconsistent implementation of encryption protocols across satellite operators and service providers. The technical details indicate that unencrypted traffic can be captured passively without the need for active exploitation or authentication, making the attack vector relatively low effort but high impact. Although no active exploits have been reported, the exposure of sensitive communications could lead to intelligence gathering, privacy violations, and potential manipulation of data streams. The threat affects confidentiality primarily, but intercepted data could also be used to facilitate further attacks impacting integrity and availability. The broad adoption of satellite communications in Europe for remote connectivity, defense, and critical infrastructure heightens the risk for European organizations. The lack of patch links or immediate remediation options underscores the need for systemic upgrades and policy enforcement to mandate encryption. This issue calls for urgent attention to upgrade satellite communication protocols, enforce encryption standards, and enhance monitoring for unauthorized interception attempts.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality for satellite communications, which can include sensitive voice calls, data transmissions, and command-and-control signals. For European organizations, this could lead to exposure of private communications, intellectual property theft, and leakage of sensitive operational data. Critical sectors such as defense, emergency response, maritime navigation, and aviation could face increased risks of espionage and operational disruption. The interception of unencrypted satellite traffic could also facilitate targeted attacks by providing adversaries with actionable intelligence. Additionally, the potential manipulation of intercepted data could undermine data integrity and availability, although this is a secondary concern compared to passive eavesdropping. The widespread use of satellite communications in remote or infrastructure-poor regions across Europe means that many organizations rely on these links for essential services, amplifying the potential operational impact. The lack of encryption also raises compliance and regulatory concerns under European data protection laws, potentially exposing organizations to legal and reputational risks. Overall, the impact is significant due to the scale of affected communications and the critical nature of satellite-dependent services in Europe.

Mitigation Recommendations

European organizations should immediately assess their reliance on satellite communications and identify unencrypted data flows. They must collaborate closely with satellite service providers to ensure the implementation of robust encryption protocols such as AES or other industry-standard cryptographic methods for all satellite links. Where possible, legacy satellite communication equipment should be upgraded or replaced to support modern encryption standards. Organizations should deploy network monitoring tools capable of detecting unusual traffic patterns or potential interception attempts on satellite links. Implementing end-to-end encryption at the application layer can provide an additional security layer beyond satellite link encryption. Regulatory bodies and industry groups should enforce mandatory encryption policies for satellite communications and promote best practices for secure satellite operations. Training and awareness programs for personnel managing satellite communications are essential to recognize and respond to potential security incidents. Finally, investing in research and development for advanced satellite security technologies, including quantum-resistant encryption and secure satellite hardware, will help future-proof satellite communications against evolving threats.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/dont-look-up-satellite-eavesdropping/54709/","fetched":true,"fetchedAt":"2025-11-05T20:15:12.568Z","wordCount":2465}

Threat ID: 690bb050976718a7330913ca

Added to database: 11/5/2025, 8:15:12 PM

Last enriched: 11/5/2025, 8:15:30 PM

Last updated: 11/6/2025, 4:24:24 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats