Starlink terminal hacked by Belgian researcher to show vulnerabilities

A Belgian researcher who used a $25 hacking build to hack into a Starlink terminal hopes his work shows the vulnerability of the low-earth orbit system.

Lennert Wouters, a security researcher at KU Leuven, showed off how he did his hack at this week’s Black Hat Security Conference in Las Vegas.

During his presentation, he went through the various hardware vulnerabilities and how he created his custom code to access the satellite array.

As per Wouters:

The widespread availability of Starlink User Terminals (UT) exposes them to hardware hackers and opens the door for an attacker to freely explore the network.

Via reporting from Wired, we understand that Wouters created a modchip to access McFlatface’s software.

This modchip causes a glitch and opens up previously locked parts of the Starlink system.

Via his presentation, Wouters noted:

Our attack results in an unfixable compromise of the Starlink [user terminal] and allows us to execute arbitrary code. The ability to obtain root access on the Starlink [user terminal] is a prerequisite to freely explore the Starlink network.

Wouters previously informed SpaceX of the vulnerability.

However, it appears to fix the vulnerability, SpaceX will need to create a new version of the main chip.

Wouter’s released his modchip specs and build on Github for others to copy if they wish after his presentation.

About Scott Nordlund 1233 Articles
Originally from the West Coast, Scott is an avid writer & EV enthusiast now living in Ottawa. He holds a MA in Political Science and once played professional football in the German Football League. Email scott@driveteslacanada.ca