How does satellite internet hijacking work?

The guys from Kaspersky have done a great job on explaining how the TURLA APT used satellites as their command and control systems.

But, the main question which we all have is how the [email protected]#[email protected] did the threat actors behind the TURLA APT gain access to the satellites.

satellite hijacking

The infographic from Securelist claims that the following scenario would be plausible:

  1. Infected system calls “decoy” satellite subscriber.
  2. The Satellite broadcasts the call over the whole area which it is able to cover.

3a. The “decoy” system drops the invalid request, claiming that it does not have such an port and service to answer the call of the satellite.

3b . The C&C pretending to be the “decoy” user accepts the call

  1. The C&C answers via the landline while hiding itself as a “decoy” system.
  2. The malware on the infected hosts upload harvested data to the command and control server.