Unencrypted Satellites Leak T-Mobile Calls, Military Data to Hackers

Researchers uncovered unencrypted satellite data, including T-Mobile calls, texts, and U.S. military communications, intercepted with cheap $800 equipment. Nearly half of scanned geostationary satellites lack encryption, exposing vulnerabilities due to industry oversight. Telecom firms like T-Mobile and AT&T are implementing fixes, but full remediation will take years.
Unencrypted Satellites Leak T-Mobile Calls, Military Data to Hackers
Written by Emma Rogers

In a startling revelation that underscores the vulnerabilities in global communications infrastructure, researchers have uncovered widespread exposure of unencrypted data beaming down from satellites, including sensitive phone calls, text messages, and even military communications. Using inexpensive equipment costing as little as $800, a team from Northeastern University and the University of Maryland intercepted a trove of unsecured transmissions, highlighting a pervasive oversight in satellite security that has persisted for years.

The study, detailed in a report published today, reveals that nearly half of the geostationary satellites scanned were transmitting data without encryption, allowing anyone with basic radio gear to eavesdrop. According to the findings shared in TechCrunch, the researchers spent the past year notifying affected parties, including telecom giants T-Mobile and AT&T, yet warn that vast amounts of satellite data will likely remain exposed for years due to the slow pace of upgrades.

The Scope of the Exposure and Its Technical Underpinnings

Among the intercepted data were thousands of T-Mobile customer calls and texts, corporate communications, and U.S. military dispatches, all floating freely in the ether. The researchers emphasized that this isn’t a sophisticated hack but rather a failure of basic security hygiene—many satellite operators assumed the signals were too obscure to attract attention, a notion debunked by the ease of access.

As reported in WIRED, the team used off-the-shelf antennas and software-defined radios to scan frequencies, capturing everything from private conversations to sensitive operational details. This method exposed how geosynchronous satellites, which hover 22,000 miles above Earth, downlink data without the encryption layers common in terrestrial networks, leaving them ripe for interception by hobbyists or adversaries alike.

Implications for Telecom and National Security

Telecom providers like T-Mobile faced particular scrutiny, with researchers capturing customer voice calls and SMS messages routed through satellite backhauls. A separate account in 9to5Mac notes that while T-Mobile has acknowledged the issue and begun implementing fixes, the scale of unencrypted traffic suggests broader industry complacency, where cost-saving measures trumped robust security protocols.

On the military front, the leaks included communications that could compromise operational secrecy, raising alarms about potential espionage risks. The Register highlights how such exposures extend to corporate data, with intercepted feeds revealing internal emails and proprietary information from various sectors, amplifying concerns over intellectual property theft.

Industry Responses and the Path to Remediation

Affected organizations have responded variably; AT&T, for instance, confirmed receipt of the alerts and is working on encryption enhancements, though full implementation could take time given the legacy systems involved. Researchers quoted in PC Gamer likened the operators’ mindset to “security by obscurity,” assuming no one would bother scanning the skies—a gamble that has clearly failed.

Looking ahead, experts predict a push toward mandatory encryption standards for satellite communications, potentially driven by regulatory bodies like the FCC. However, as Interesting Engineering points out, the global nature of satellite networks complicates enforcement, with many operators in jurisdictions lacking stringent oversight.

Broader Lessons for Digital Infrastructure

This incident serves as a wake-up call for the interconnected world of telecom and defense, where satellite links form the backbone of remote and emergency communications. The ease of interception—detailed in Cointelegraph as requiring just $600 in gear for some setups—underscores the need for proactive threat modeling, moving beyond assumptions of inaccessibility.

Ultimately, while patches are underway, the persistence of unencrypted downlinks means vulnerabilities will linger, urging industry insiders to prioritize encryption retrofits and spectrum monitoring to safeguard against future breaches. As satellite constellations expand with players like Starlink, integrating security from the outset will be crucial to prevent history from repeating itself.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us