SuperVillance
A hacker breached into NASA server and leaked a trove of data that can cause unimaginable damage to the administration.
A couple of days ago it was reported that a hacker going with the handle of @CthulhuSec leaked confidential data stolen from the United States largest police union. Now, the same hacker has come up with another leak of 250GB data stolen from The National Aeronautics and Space Administration (NASA) servers after spending several months inside the administration’s internal network.
It is being reported that around 631 aircraft and radar videos along with 2,143 flight logs and data of at least 2,414 employees is included in the information released by the hacker. The revealed data also included email addresses, names and phone numbers of NASA employees.
The breach was announced on the official Twitter account of @CthulhuSec where he claimed that data may not be harmful for the administration. (Well, that’s for hackers and scammers to decide).
The Zine — Treasure Trove of Information:
In their self-published paper “zine” AnonSec gave away crucial details related to the hack attack, which is now being dubbed as “OpNasaDrones.” The article informs about necessary details such as the hacker group’s motive behind this data breach and the salient technical vulnerabilities that led to such an extensive breach.
While referring to an infamous Trojan that has managed to infect more than 1million computers until now, the hackers wrote in the paper:
“NASA has been breached more times than most people can honestly remember… However, this hack into NASA wasn’t initially focused on drones [sic] data and upper atmosphere chemical samples. In fact the original breach into NASA systems wasn’t even planned, it was caught up in a gozi virus spread.”
In the paper, the group also claimed that around two years ago, it purchased “initial foothold” from another hacker who had knowledge about NASA servers. Soon after, the team started testing the number of machines it could “break into” and “root.” Break Into and Root are terms that are used to refer to an account having complete control over any network or computer.
It only took the team “0.32” seconds to brute force an administrator’s SSH password. This can be attributed to the credentials being the default. The hackers then gained deeper access to the intricate system of NASA and acquired an extensive range of login data using a hidden packet sniffer.
Some group members mapped the network while others examined the “different missions, databases, and aircraft” that were listed by the agency. Also, public missions such as “Operation Ice Bridge/OIB” and drones like “Global Hawk” were included among those that were mentioned.
As the team penetrated deeper into NASA’s system, the records of their presence were deleted. They managed to hack the agency’s security cameras and identified the schematics to one of the base camera’s layout. The group then infiltrated the “Glenn Research Center, Goddard Space Flight Center and Dryden Flight Research Center” networks.
When inside, AnonSec stated that they began identifying the presence of various systems; networked devices started “popping up in scans that were not previously visible,” reports the InfoWars
The hackers somehow got hold of a password belonging to the system administrator and thus, they obtained full access to three NAS (network-attached storage) devices, responsible for collecting the aircraft flight logs backups.
The group mocked the system administrator who was in charge of data security at NASA by writing: “Now we had all 3 NAS devices automatically making copies of the logs as they are uploaded from the drones and renaming them to look like semi-ordinary index files.”
As soon as the information started flowing in discreetly, the hackers started analyzing the data acquired from what they believed was a “weird traffic.” The traffic comprised of “pre-planned route option files” that helped NASA to upload flight paths before flights take off.
Few months later, the group decided to carry out a man-in-the-middle attack (MiTM attack) after some group members protested and replaced the drone route file with their own file to crash one aircraft into the ocean.
More Hacking Technique
-
How successful marketing teams are optimizing performance in 2026 (and what
metrics they’re tracking)
-
[image: How successful marketing teams are optimizing performance in 2026
(and what metrics they’re tracking)]
HubSpot’s 2026 State of Marketing report u...
1 day ago
-
How I Set Up Guest Checkout in WooCommerce in Just 5 Minutes
-
I once tried to buy a pair of headphones I really wanted. But when I got to
the checkout page, the store asked me to sign in. Since it was just a
one-tim...
1 day ago
-
8 Top WordPress Plugins for 2026 (Build Faster, Keep It Simple)
-
8 WordPress plugins for 2026: builder, booking, data tables, animations,
maps, grids, and forms. Updated tools that speed setup and keep sites easy
to ma...
1 week ago
-
How I Get Paid to Shop Online (And You Can Too!)
-
We all shop online—whether it’s ordering dinner on Swiggy, buying the
latest sneakers on Myntra, or stocking up on groceries from Amazon. But
what if I t...
1 week ago
-
On a Happy New Year
-
We are about to experience the most social upheaval since industrialization.
What will that look like in sixty years?
Sinless is starting it's third yea...
3 weeks ago
-
9 Savvy Ways to Solo Travel Without a Plan | The Art of Winging It in Travel
-
[image: nagarkot, hiking nagarkot, nagarkot nepal]Last Updated on January
6, 2026 by Christine Kaaloa Anthony Bourdain famously said, “I’m a big
believer...
4 weeks ago
-
My Blogging Journey: From $0 to Global Influence (and Everything I Didn’t
Expect)
-
[…]
My Blogging Journey: From $0 to Global Influence (and Everything I Didn’t
Expect) is a post from ShoutMeLoud - Shouters Who Inspires
7 months ago
-
How to Remove FileOpen DRM Protection from PDF?
-
If you want to remove FileOpen DRM protection from a PDF, follow these
steps. Note that this method will only work on a system that already has
the neces...
1 year ago
-
Mastering Windows Commands: A Comprehensive Guide
-
*Welcome to our comprehensive guide on mastering Windows commands. In this
article, we'll delve into the world of Windows Command Prompt and
PowerShell,...
1 year ago
-
Best Travel Water Bottle: A Comparison Guide
-
Why We’re Water Bottle Experts Between Shawn and Angela, they’ve tested
dozens of water bottles while traveling. This includes more than a decade
of hard...
2 years ago
-
Apple Preparing to Launch USB-C Wired EarPods
-
Apple is reportedly gearing up to launch a new version of its wired EarPods
featuring a USB-C port. The news comes ahead of the release of the iPhone
15, w...
2 years ago
-
Assassin's Creed - 1.60 GB [Repack] - Full PC Game Free Download | By
Priyanshu
-
Assassin's Creed is an action-adventure video game developed by Ubisoft
Montreal and published by Ubisoft. It is the first installment in the
Assassin's...
5 years ago
-
How to Make Natural Hand Sanitizer using Home Products
-
Hand Sanitizers are basically essential in providing you with another level
germ protection, after washing your hands you can apply some hand sanitizer
w...
5 years ago
-
Most important Internet ERROR Codes
-
ERROR Code
Hello, guys, I'm going to show you most important internet ERROR codes that
actually help you future internet surfing experience. Today we ar...
6 years ago
-
How to Track Someone's Geographical Location using ExifTool
-
How to Track Geographical Location using ExifTool (OSINT)
Hello Readers
Nowadays , As you are aware that we all are attached to social media in
such a...
7 years ago
-
The Choice Engine
-
A project I’ve been working on a for a long time has just launched: The
Choice Engine is an interactive essay about the psychology, neuroscience
and philos...
7 years ago
-
Top 10 Best/Impossible Phone Patterns Ever
-
Probably you are searching for the android pattern lock ideas and you
landed here ! So, here we’ll discuss how you can create the most difficult
to unlock...
8 years ago
-
-
What is Ransomware and How to Stay Protected
-
Ransomware is a type cyber attack which uses malware to affect the files on
the computer by holding them hostage so that the user has to pay a sum of
amo...
8 years ago
-
How To Create Amazon AWS RDP 100% Free | Create Your Own VCC
-
How To Create Amazon AWS RDP 100% Free | Create Your Own VCC
Watch the full video to learn how to make it.. 100% working method.
8 years ago
-
5G Technology To Feature 20GBps Download Speed
-
Well, it was previously confirmed that 5G would be the official successor
to 4G wireless connectivity as the fifth generation mobile wireless
connectivi...
8 years ago
-
Get Free 100rs per Referal to ypur bank Account
-
Hello, Guys, Chillr App Loot where you can earn again now real money in
your bank account. Just Download the Chillr App and enter your mobile
number. No...
8 years ago
-
10 Mind Blowing Safety Tips To Avoid Being Scammed while E-Shopping
-
10 Mind Blowing Safety Tips To Avoid Being Scammed while E-Shopping
9 years ago
-
Hello world!
-
Welcome to WordPress. This is your first post. Edit or delete it, then
start writing!
The post Hello world! appeared first on Ethical Hacking Tricks.
9 years ago
-
100 SEO Tips To Increase your Blog Search Ranking on Google in Hindi
-
अगर आपके पास कोई वेबसाइट and blog है तो आपको पता होगा की site के लिए SEO
कितना जरुरी होता है और website search engine optimization कैसे किया जाता
है. सिर...
9 years ago
-
-
Watch Full Movie or TV Series in HD
-
*Watch Full Movie or TV Series in HD*
We all love movies and TV series but we have to depend on torrents or
any other free provid...
9 years ago
-
How To Stop Users Using Adblocker In Your Blog - Blogger
-
Google adsense is the main revenue for almost all free content published
blogs, but recently adblock kill us our main source of revenue. Though
Adblocker g...
9 years ago
-
AIr Panda Awesome Tap Game Available FREE for iOS
-
Are you ready to test your skills against the ultimate dexterity game? Take
control of a cute panda and help him gain the highest score all while
trying t...
9 years ago
-
AirTel Free Internet 3G Vpn Trick With Netify VPN | June 2016
-
Airtel Free Internet 3G Vpn Trick With Netify Vpn . ItWorks Only on
UnrootedMobilesNot for Rooted Mobiles Try at0 Balance With No Data Pack.
Steps To Foll...
9 years ago
-
Boost your Website Search Engine Rankings through your Android Smartphone
-
*Website Booster*
Give your website a boost by using this small utility. The app submits your
website URL to 2500+ back link sites in turn increasing the...
9 years ago
-
7 New Whatsapp features that will make you smarter
-
WhatsApp has recently completed 1-billion users. It has now become one of
the fastest mode of communication in many countries. It has got many new
featur...
9 years ago
-
How To Get Free Master Credit Card Online in 15 Min [For Online Use]
-
[image: Visa-Mastercard-credit-cards-e1387426494114]hello guys, Shivam
Here. like recent launch of Netflix which is free for first month but they
require a...
10 years ago
-
Wifi adapter packet injection test
-
[image: Thumbnail]Questions about if a certain Wifi adapter is compatible
with the Aircrack-ng suite or what Wifi card is capable of packet injection
and o...
10 years ago
-
10 Free Halloween Design Resources for Download
-
Halloween’s still a month away, but why not get a headstart on your themed
designs with these creepy cool free downloadable designs? Check out this
collect...
10 years ago
-
Easy Hide IP: Your Key To Anonymity On Web
-
No doubt, Internet is the greatest achievement of mankind in 21st century.
Cerebrum aka Brain is what makes all the difference between homo sapiens
and o...
10 years ago
-
How to make Modal Window & Popup Boxes with CSS3, Js and Jquery
-
[image: Creating Modal Dialog Popup Boxes with HTML, CSS3 and Javascript]
Modal boxes are quick operable boxes used for Advertisements, Login/Signup
Fo...
10 years ago
-
AIRTEL 3G NEW HOST TRICK FOR BLOCKED & UNBLOCKED - TRENDING UNLIMITED
-
We are here to provide you new configs for airtel 3G ;AirTel 3G New
Multiple Hosts For Blocked and Unblocked sim cards Trick Trending Unlimited
May...
11 years ago
-
How To Lock Your PC With Mouse | Learn Something Different!!!
-
We are here to learn about how to lock your PC with mouse. Just follow
these simple steps to do this-
1- Firstly Right click on your desktop and make new...
13 years ago
-
Add or remove your username in Start Menu
-
By default , windows shows your username at the top of start menu.If you
want to remove this , you can just follow these steps:
>>Go to Start>Run . Type *r...
14 years ago
-
AIRTEL: UNLIMITED FREE GPRS BROWSING FOR AIRTEL IN PC
-
Hi friends, hope you are all fine…After my last post on GET FREE TATA
DOCOMO 1p/2sec plan for 3months…I’m here with a FREE GPRS TRICK for AIRTEL….
Ø You...
14 years ago
-
Convert text into audio using Notepad
-
Notepad ; a simple programme. But we can do lot's of things with this. I
gave you more tricks from notepad here before. Today I am going to tell you
anot...
14 years ago
-
Hack passwords stored in your Windows.....
-
As we all know, Windows stores most of the passwords which are used on a
daily basis, including instant messenger passwords such as MSN, Yahoo, AOL,
Window...
14 years ago
-
Happy New Year 2011
-
*"WISHING A VERY HAPPY NEW YEAR 2011 TO ALL MY READERS"*
15 years ago
-
How to Hack into a Security Camera
-
This is really interesting article. Well this is not really hacking. All
what we are looking at are unsecured cams from around the world that are
interface...
15 years ago
-
Firefox Keylogger from TrUe HaCkinG to save passwords
-
Hello friends, After a long time, I am back with new hacking tool in this
blog and this blog now opened for all readers now .In this post I am going
to sho...
15 years ago
-
Fun with 2D Barcodes on Your Phone
-
Have you noticed those strange black and white grids - like demented
crosswords - popping up around the place? In newspapers, flyers and the
like? No? Well...
17 years ago
-
baby, wanna feel better?
-
*The foundation of all mental illness is the avoidance of legitimate
suffering* - Carl Gustav Jung
20 years ago
-
No comments:
Post a Comment