• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Shades of Mr. Robot — Life imitates art as Raspberry Pi used to hack NASA network

June 26, 2019 By Lee Teschler Leave a Comment

A report from the NASA Office of Inspector General released a few days ago reveals the network within NASA’s Jet Propulsion Lab was compromised in a manner resembling that portrayed in an episode of the popular TV series, Mr. Robot.

In April 2018, JPL discovered an account belonging to an external user used to log into JPL’s
mission network had been compromised. Because of how JPL’s network is architected, the attackers were able to expand their access upon entry and move laterally across the network. The attack went undetected for nearly a year.

One reason the attack was successful, says the report, is that NASA system administrators often don’t regularly enter new devices into an information technology security database (ITSDB) because the database’s updating function sometimes doesn’t work. So items can be added to the network without being properly identified and vetted. The report says the April 2018 cyberattack exploited this particular weakness when the hacker accessed the JPL network by targeting a Raspberry Pi connected to the network that wasn’t authorized to be there.

The report seems to imply that the Raspberry Pi had been added innocently but ended up being a

mr. robot
The thermostat being hacked on Mr. Robot. Images courtesy of USA Network.
mechanism for intrusion. In that regard, it resembles the events of a 2015 episode of the popular TV series Mr. Robot (having the catchy title “eps1.4_3xpl0its.wmv”) wherein the main character destroyed magnetic tape data backups by raising the temperature of the storage room to point where the tapes were compromised. The means of raising the temperature was to connect an ordinary Raspberry Pi computer board into the climate control system. The Pi simply overrode climate commands from the building automation controller.

Once the Raspberry Pi had been added to the HVAC network, the Mr. Robot hackers accessed it remotely via a real-life website called Shodan (www.shodan.io), a search engine that lets users find not just HVAC systems but also routers, servers, and other equipment connected to the internet. The hack on TV worked because the building HVAC network was connected directly to the internet (a practice that security professionals warn against) and because the HVAC network had no means of authenticating devices connected to it. (Security professionals say this security defect is common among older industrial network standards.)

An additional common factor between the Mr. Robot hack and the NASA infiltration seems to be a lack of visibility for network connections. According to the NASA report, the attacker, using an external user account, exploited weaknesses in JPL’s system of security controls to move undetected

mr. robot raspberry pi
A Raspberry Pi 3 (a later model than that used in Mr. Robot) next to a thermostat for a commercial building. The Pi measures about 33⁄8×23⁄16 in.
within the JPL network for approximately 10 months. Prior to detection and containment of the incident, the attacker exfiltrated approximately 500 megabytes of data from 23 files, two of which contained International Traffic in Arms Regulations information related to the Mars Science Laboratory mission, the report said. More importantly, the attacker successfully accessed two of the three primary JPL networks. Accordingly, NASA questioned the integrity of deep space network data related to space flight systems and temporarily disconnected several space flight-related systems from the JPL network.

The NASA report also said the cyberattacker from the April 2018 incident exploited the JPL network’s lack of segmentation to move between various systems connected to a network gateway, including multiple JPL mission operations and the deep space network.

NASA says it has since installed additional safeguards on its firewalls and has implemented other security measures.

You may also like:

  • Raspberry Pi 4
    Raspberry Pi 4 computer incorporates 28nm SoC for increased in…
  • Artificial Intelligence
    DIY Artificial Intelligence

  • Educational robotic kits added to element14’s product portfolio
  • alexa sdk
    “Alexa, get me an SDK”

Filed Under: Applications, Featured, IoT, Security Tagged With: nasa, Raspberry Pi

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

RSS Current EDABoard.com discussions

  • i need an embedded c program that will read a 12 bit memory address from the io pins and output the data to pins from the memory in a 8051 mcontroller
  • DC/DC Converter with wide range input
  • Help with HFSS: Mesh error, found 6 bodies without triangles
  • DC TIG inverter to AC and pulse TIG inverter
  • Achieving Efficiency and Stability in High-Speed Electric Motorcycle Motor Controllers: The YMIN Solid-Liquid Hybrid Capacitor Solution

RSS Current Electro-Tech-Online.com Discussions

  • parallel-to-serial problem
  • Behringer MX 1602 mixer - reading block diagram
  • Fluke 123 scopemeter not reading ANY voltage, please help
  • Back to the old BASIC days
  • Actin group needed for effective PCB software tutorials

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy