September 7, 2022 By Jennifer Gregory 2 min read

In April 2022, a bipartisan group of congressmen introduced the Satellite Cybersecurity Act. Senators Gary Peters (D-MI) and John Cornyn (R-TX) authored the bill, and Congressman Andrew R. Garbarino (R-NY) joined with Congressman Tom Malinowski (D-NJ) to introduce the bill to the U.S. House of Representatives.

“We depend on satellites for everything from driving to work to defending our country, yet our space systems are vulnerable to cyberattack, and the commercial satellite industry has been asking for help to protect Americans against this threat,” said Rep. Malinowski in a statement. “Our bill directs the U.S. government’s primary cyber-defense agency to provide that help.”

Satellite cybersecurity act requires resources and study

The congressmen created the Satellite Cybersecurity Act in response to recent threats and current processes and measures. Here are the two main components:

  • Consolidating resources and best practices. Because different companies own the satellites, they have different processes and best practices. The act requires that the Cybersecurity and Infrastructure Security Agency (CISA) create a commercial system cybersecurity clearinghouse within 180 days of the act becoming law. By creating a public hub and uniform best practices that companies can follow if they choose, the act aims to create more consistent protocols for all satellites. The resources will also include recommendations for network security used to manage and operate the satellites. In addition, some of the resources will be geared to small businesses that have different resources and processes than enterprises.
  • Directs CISA to perform a study on federal government support of commercial satellite industry cybersecurity. Within two years of the act becoming law, CISA must study how the federal government supports commercial satellite systems. The study must also include how the government has addressed critical infrastructure cybersecurity.

“Commercial satellites are an integral part of our infrastructure network and must be protected from cyberattacks by bad actors that would compromise our national security,” said Sen. Cornyn in a statement.

Risks of satellite cyberattacks

An attack conducted through a satellite in February shows the risks and impact of this type of attack. Cyber criminals deployed data wiper malware called Acid Rain onto a KA-SAT satellite. This type of malware wipes data from routers and modems, which leave them inoperable. By targeting the satellite that provided broadband service to SATCOM modems, the attack impacted thousands of modems in Ukraine and tens of thousands in Europe. Because the attack rendered the modems inoperable, the damage spilled to over 5,800 wind turbines in Germany.

“It’s clear the government must provide more cybersecurity support to small businesses and other companies that own and operate commercial satellites before it’s too late. This bipartisan bill will help ensure these organizations — who often do not have enough resources — are able to protect their own networks,” said Sen.Peters in a statement.

More from News

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally. The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets. Who is exploiting the NGFW zero-day? As of now, little is known about the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today