Over the past 24 hours, a series of coordinated and highly sophisticated Global Navigation Satellite System (GNSS) spoofing attacks have been reported across the Middle East and Eastern Europe, primarily targeting civil aviation. These attacks employ a technique known as "time skew sabotage" to manipulate timestamps in GPS signals, directly threatening the integrity of automated aircraft landing systems. The threat extends beyond aviation, with related attacks on a major solar farm network in Western Europe attempting to induce a "flow reversal" to destabilize the power grid. In response to this clear and present danger to critical infrastructure, G7 nations have announced the GNSS Resilience Act, new legislation mandating inertial and radio-assisted backup navigation systems. Concurrently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 26-24, signaling the high-level government concern over these cyber-physical threats.
The attacks represent a significant escalation in cyber-physical warfare, moving from theoretical to practical application against critical transit and energy infrastructure. The primary vector is the manipulation of GNSS signals, which are unencrypted and publicly broadcast, making them susceptible to spoofing by a sufficiently powerful local transmitter.
These incidents highlight a strategic, multi-pronged effort to undermine trust in and functionality of Western critical infrastructure by exploiting its dependence on satellite-based timing and navigation.
The attackers are demonstrating a deep understanding of the protocols and systems that underpin modern navigation and power management.
This technique involves broadcasting a counterfeit GNSS signal that is synchronized with the authentic signal but contains a slightly modified timestamp. The target receiver locks onto the stronger, malicious signal. The gradual or sudden shift in the time value causes the receiver's position-navigation-timing (PNT) solution to become inaccurate, leading to dangerous miscalculations in systems like automated landing guidance.
Solar inverters communicate using industrial protocols (e.g., Modbus, DNP3). Attackers likely gain access to the operational technology (OT) network through IT/OT convergence points or remote access vulnerabilities. Once inside, they can send malicious control commands to the inverters, overriding normal safety protocols and instructing them to push unregulated voltage onto the grid. This is a classic example of an attack that crosses the cyber-physical divide.
T0880 - Spoofer: The core of the attack involves spoofing GNSS signals to deceive target receivers.T0884 - Inhibit Response Function: By providing false data, attackers inhibit the normal, safe operation of automated landing systems and power grid inverters.T0828 - Impair Process Control: The attack on the solar farm is a direct attempt to impair the process control of power generation and distribution, potentially causing physical damage.T0886 - Remote Services: Attackers likely leveraged remote services to gain initial access to the OT network of the solar farm.The potential impact of these attacks is severe and multi-faceted:
Detecting signal manipulation requires moving beyond reliance on a single source of truth.
D3-NTA - Network Traffic Analysis.Long-term mitigation requires architectural changes and legislative enforcement.
D3-NI - Network Isolation countermeasure.Use data historians to log and analyze sensor and actuator values, allowing for the detection of anomalous behavior indicative of manipulation.
Segmenting the OT network from the IT network and the internet limits the attack surface and contains breaches.
Implementing redundant, dissimilar systems like Inertial Navigation Systems (INS) ensures that a failure in one system (like GNSS) does not cause a total failure.
In the context of the solar farm attack, deploying Network Traffic Analysis within the Operational Technology (OT) network is critical. This involves using OT-aware intrusion detection systems (IDS) or anomaly detection platforms to monitor industrial protocols like Modbus or DNP3. Security teams should establish a baseline of normal traffic patterns between the SCADA master station and the power inverters. Alerts should be configured for any deviations, such as unauthorized devices communicating on the network, malformed packets, or control commands originating from an untrusted source. Specifically for the 'flow reversal threat,' the system should monitor for repeated or unusual commands sent to inverters that could override safety thresholds. This allows for the detection of manipulation attempts before they can cause physical damage to grid components like transformers.
Platform Hardening for GNSS receivers and ICS components is a crucial preventative measure. This involves disabling any unused ports or services on the devices, changing default credentials, and ensuring firmware is kept up-to-date with the latest security patches. For GNSS receivers in critical applications, hardening should include configuring them to only track specific, expected satellite constellations and to reject signals that do not meet strict plausibility checks (e.g., sudden large jumps in position). For the solar farm inverters, hardening involves restricting management access to a dedicated, isolated network segment and using access control lists (ACLs) to ensure only authorized SCADA systems can issue control commands. This reduces the attack surface and makes it more difficult for an attacker who gains initial access to the broader network to manipulate the devices.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats