Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Half of the world's satellite traffic is unencrypted | Kaspersky official blog

0
Medium
Vulnerability
Published: Wed Nov 05 2025 (11/05/2025, 20:03:41 UTC)
Source: Kaspersky Security Blog

Description

Researchers have determined that a significant portion of global satellite traffic lacks encryption. Let's delve into how data — even from your cellphone calls — can leak from orbit.

AI-Powered Analysis

AILast updated: 11/20/2025, 02:28:26 UTC

Technical Analysis

Recent research highlighted by Kaspersky reveals that approximately half of the world's satellite communication traffic is transmitted without encryption, creating a substantial security vulnerability. Satellite communications, which include data from cellphone calls, internet backhaul, maritime and aviation communications, and military transmissions, often rely on legacy systems or cost-sensitive implementations that omit encryption. This lack of encryption allows adversaries equipped with satellite receivers and signal processing tools to intercept and analyze sensitive data directly from orbit or ground stations. The vulnerability is systemic, affecting a wide range of satellite operators and communication providers globally. While no active exploits have been reported, the passive nature of interception means attackers can quietly collect intelligence without alerting targets. The threat compromises confidentiality primarily, as intercepted data can include personal communications, corporate data, and potentially classified information. The integrity and availability of satellite services are less directly impacted by this vulnerability. The absence of encryption is often due to technical constraints, regulatory gaps, or economic considerations. The risk is exacerbated by the increasing reliance on satellite communications for critical infrastructure and the growing sophistication of adversaries capable of satellite signal interception. The medium severity rating reflects the significant confidentiality impact and ease of exploitation balanced against the lack of active exploitation and the technical challenges in intercepting satellite signals. This issue calls for urgent attention to implement encryption standards such as AES or other robust cryptographic protocols in satellite communication links and to conduct comprehensive security assessments across satellite networks.

Potential Impact

For European organizations, the unencrypted satellite traffic vulnerability poses a serious risk to the confidentiality of sensitive communications, including governmental, military, maritime, aviation, and commercial data. Intercepted data could lead to espionage, intellectual property theft, or exposure of personal information, undermining privacy and national security. Critical infrastructure sectors that depend on satellite communications for remote connectivity or backup links may face increased exposure to data leakage. The threat also affects telecommunications providers who use satellite backhaul, potentially compromising customer data and communications. While the vulnerability does not directly impact data integrity or availability, the loss of confidentiality can have cascading effects on trust, regulatory compliance (e.g., GDPR), and operational security. European defense and aerospace sectors are particularly vulnerable given their reliance on satellite communications for command, control, and intelligence. The potential for adversaries to conduct passive surveillance from orbit or ground stations without detection increases the risk of long-term intelligence gathering against European targets. This could influence geopolitical dynamics and intelligence operations within Europe. The medium severity reflects a balance between the widespread nature of the vulnerability and the technical sophistication required to exploit it effectively.

Mitigation Recommendations

European organizations should prioritize the implementation of strong encryption protocols for all satellite communication links, including legacy systems where feasible. This includes adopting industry-standard cryptographic algorithms such as AES-256 for data in transit. Satellite communication providers must conduct comprehensive security audits to identify unencrypted traffic and upgrade their systems accordingly. Regulatory bodies in Europe should enforce stricter compliance requirements mandating encryption for satellite communications, especially for critical infrastructure sectors. Organizations should also employ signal monitoring and anomaly detection tools to identify unauthorized interception attempts or unusual traffic patterns. Collaboration between satellite operators, cybersecurity agencies, and government entities is essential to share threat intelligence and develop best practices. Investment in next-generation satellite communication technologies that inherently support encryption and secure key management is recommended. For sensitive communications, consider using additional layers of encryption at the application layer to protect data end-to-end. Training and awareness programs for stakeholders in satellite communications can help emphasize the importance of encryption and secure configurations. Finally, contingency planning should include strategies to respond to potential data leaks or interception incidents.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/dont-look-up-satellite-eavesdropping/54709/","fetched":true,"fetchedAt":"2025-11-05T20:15:12.568Z","wordCount":2465}

Threat ID: 690bb050976718a7330913ca

Added to database: 11/5/2025, 8:15:12 PM

Last enriched: 11/20/2025, 2:28:26 AM

Last updated: 12/20/2025, 6:45:35 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats