THE SIGN BY CYSAT

Go back

Trusted access, hidden threat: The Insider problem in Space Systems

For years, space cybersecurity has been framed as a battle against external adversaries - hostile states, signal interception, and remote exploitation of satellite systems. It is a narrative that aligns well with how we imagine conflict in space: distant, technical, and clearly defined. But this model is no longer sufficient. The real risk is shifting inward. And in many cases, it is already there. The most dangerous attack vector doesn’t come from orbit - it already has access.

A growing attack surface - and shrinking trust boundaries

The global space economy is expanding at an unprecedented pace. According to recent industry estimates, it surpassed $570 billion in 2025, with commercial satellite systems accounting for the majority of that growth. At the same time, the number of active satellites in orbit has exceeded 10,000, largely driven by low Earth orbit (LEO) constellations.

This rapid scaling has fundamentally changed how space systems are built and operated. Satellite infrastructure is no longer isolated. It is now tightly integrated with cloud services, software-defined architectures, and globally distributed ground stations. A single constellation may rely on dozens of vendors, multiple software pipelines, and continuous remote updates.

In practical terms, this means one thing:
the number of trusted entities has grown faster than the ability to control them.

Insider threat: not a scenario, but a statistical reality

Across the broader cybersecurity landscape, insider-driven incidents are no longer theoretical.

According to multiple industry reports:

  • up to 60% of data breaches involve valid credentials
  • insider-related incidents have increased by more than 40% over the past five years
  • the average cost of an insider incident now exceeds $15 million per organization in critical sectors

There is no structural reason why space systems would be immune to these trends. In fact, they may be more exposed.

Unlike traditional IT environments, satellite systems often operate with:

  • limited visibility into real-time behavior
  • delayed patching cycles
  • high reliance on trusted command chains

This combination creates ideal conditions for insider-driven compromise - not necessarily through malicious intent, but through access that is too broad, too persistent, and too poorly monitored.

When access equals control

In most terrestrial systems, access does not automatically imply critical impact. In space systems, that distinction is much thinner.

An operator with sufficient privileges can:

  • issue commands directly affecting satellite orientation or payload
  • deploy or modify onboard software
  • interact with telemetry streams and data pipelines

In 2022, the disruption of satellite communications during the early hours of the war in Ukraine demonstrated how fragile space-dependent infrastructure can be. While that incident is widely associated with external compromise, it also exposed a deeper issue: centralized control systems represent a single point of failure - especially when access is trusted by design.

In large constellations, the stakes are even higher. A misconfigured update or unauthorized command does not remain local. It can propagate across multiple nodes, affecting synchronization, communication, and overall system stability.

The risk is not always destruction.
More often, it is subtle manipulation.

Ground stations: the overlooked entry point

While satellites capture attention, control remains Earth-based.

Ground stations are, in many ways, the most exposed component of the entire architecture. They are connected, remotely managed, and often operated across hybrid environments involving internal teams and third-party contractors.

From a security perspective, they resemble enterprise IT systems - but with significantly higher stakes.

Research and incident analysis have shown that:

  • misconfigured access controls remain one of the most common weaknesses
  • remote access interfaces are frequently insufficiently segmented
  • monitoring focuses on availability, not behavioral anomalies

An insider - or an attacker operating with insider-level access - does not need to exploit vulnerabilities in orbit. They can act through legitimate operational channels, issuing commands that appear valid and expected.

In such cases, detection becomes extremely difficult.

The supply chain problem: trust without verification

Modern satellites are not built by a single entity. They are assembled through a complex supply chain involving software vendors, hardware manufacturers, and integration partners.

Each of these actors introduces a layer of trust.

Recent academic research and industry analysis have demonstrated that:

  • firmware-level vulnerabilities can persist undetected for years
  • third-party components may introduce undocumented functionality
  • compromised development environments can affect entire fleets of devices

This creates a critical blind spot.

If a malicious element is introduced during development - intentionally or otherwise - it becomes part of the system long before deployment. By the time the satellite is in orbit, the attack surface is already embedded.

In this context, the insider threat is no longer tied to a person.
It becomes systemic.

Why detection is fundamentally harder

One of the most challenging aspects of insider risk is that it does not behave like traditional cyberattacks.

There are no obvious indicators of compromise. No brute-force attempts. No suspicious external connections.

Instead, there is:

  • legitimate access
  • valid credentials
  • expected behavior - at least on the surface

This makes conventional security models insufficient. Systems designed to detect intrusion struggle to identify misuse.

And in space systems, where latency, bandwidth, and processing constraints already limit monitoring capabilities, this challenge is amplified.

The uncomfortable reality: space security still relies on trust

Despite increasing complexity, much of the space industry continues to operate on an implicit trust model.

Trust in engineers.
Trust in vendors.
Trust in internal processes.

But modern cybersecurity has repeatedly demonstrated that trust, when not continuously verified, becomes a vulnerability.

The shift toward zero-trust architectures - widely adopted in terrestrial environments - is still in its early stages in space systems. And yet, the need for it is arguably greater here than anywhere else.

The next phase: insider risk in autonomous systems

As satellite operations become more automated, insider threats are likely to evolve rather than disappear.

AI-driven systems are already being explored for:

  • autonomous collision avoidance
  • dynamic resource allocation
  • onboard decision-making

But these systems are trained, configured, and updated by humans.

This introduces a new category of risk:
the possibility of embedding bias, manipulation, or hidden logic into autonomous behavior.

In such cases, the insider is no longer interacting with the system directly.
They are shaping how it behaves over time.

Hidden in the Code: Vulnerabilities and Open-Source Risk in Space Software

If insider threat is about trusted access, then software is where that trust becomes operational - and increasingly, that software is built on shared components.

Modern space systems heavily rely on open-source solutions such as NASA’s Core Flight System (cFS) and Yamcs, as well as a wide range of general-purpose libraries. This enables rapid deployment and standardization, but at the same time creates a shared attack surface.

And this is no longer a theoretical concern.

Research shows that vulnerabilities in space systems are rarely sophisticated zero-days. Instead, they are often basic security flaws - from weak authentication mechanisms to the complete absence of encryption. In several cases, researchers have demonstrated the ability to send commands to satellites through unsecured or poorly protected interfaces.

Notably, even open-source platforms used in the space sector have had documented vulnerabilities. For example:

  • CVE-2022-39263 - allowed arbitrary command execution via API in a mission control system
  • CVE-2021-44228 - the critical Log4Shell vulnerability in Log4j, which impacted numerous systems, including those used in aerospace and satellite ground infrastructure

The latter case is particularly illustrative: the vulnerability was not specific to space systems, yet due to the widespread use of shared components, it automatically became a risk for space infrastructure as well.

More broadly, studies indicate that up to 80% of cybersecurity incidents in space systems are linked to basic security failures, rather than advanced attack techniques. These include improper access control, lack of segmentation, and the use of vulnerable components.

In this context, open-source and COTS solutions are not just enablers of innovation - they are also potential vectors of compromise.

And this is where the connection to insider threat becomes critical.

When dozens of developers, contractors, and vendors contribute to a shared codebase, every change is implicitly trusted. Yet that trust is rarely verified at every level.

As a result, the line between a “vulnerability” and an “insider” begins to blur. A coding mistake, a compromised dependency, or an insecure update can have the same effect as a deliberate insider attack.

Final Thoughts

The space industry is entering a phase of rapid transformation. Systems are becoming more connected, more software-driven, and more dependent on complex ecosystems of trust. But security models have not fully caught up.

The focus remains on defending against external threats - while the most critical vulnerabilities may already exist within. The question is no longer whether satellite systems can be attacked.

It is whether we are ready to accept that trusted access itself has become the primary attack surface.

Author: Nessa, Cyber Journalist

Subscribe to our bi-weekly Linkedin newsletter

Subscribe

You can support TheSIGN by becoming our SATELLITE. Click to learn more about sponsorship.