Not the first time, says NASA; astronauts load up Norton AntiVirus Malware has managed to get off the planet and onto the International Space Station (ISS), NASA confirmed today. And it’s not the first time that a worm or virus has stowed away on a trip into orbit.The attack code, which space news site SpaceRef.com identified Monday as “W32.Gammima.AG,” infected at least one of the laptops used on the station, an international effort headlined by the U.S. and Russia.National Aeronautics and Space Administration spokesman Kelly Humphries declined to identify the malware, saying only that antivirus software detected a worm on July 25.The first public report of malware about the ISS was logged on Aug. 11. In NASA’s daily status report on the station, the agency said that Sergey Volkov, the ISS commander, was “working on the Russian RSS-2 laptop” and “ran digital photo flash cards from stowage through a virus check with the Norton AntiVirus application.” A week later, on Aug. 21, Volkov “checked another Russian laptop, today RSK-1, for software virus by scanning its hard drives and a photo disk.”The next day, Volkov transmitted antivirus scanning results from the laptop to Earth, and U.S. astronaut Greg Chamitoff scanned another computer for possible infection. NASA also said in Friday’s report that all laptops on board the ISS were being loaded with antivirus software. “All A31p laptops onboard are currently being loaded with [the] latest [Norton AntiVirus] software and updated definition files for increased protection,” said NASA.W32.Gammima.AG — the name that Symantec Corp., maker of Norton AntiVirus, gave the malware — is a year-old Windows worm designed to steal information from players of 10 different online games, some of them specific to the Chinese market. Among the games: ZhengTu, HuangYi Online and Rohan.The worm also plants a rootkit on the infected system and transmits hijacked data to a remote server.Today, Humphries said that the worm poses no threat. “It was never a threat to any command-and-control or operations computer,” he said. He refused to detail how the malware snuck aboard, citing “IT security issues,” but other sources, including SpaceRef.com, speculated that it might have stowed away on a laptop or a flash card.In fact, the Aug. 11 ISS log entry hinted at digital camera storage cards as a suspect.“There have been other incidents,” confirmed Humphries, who works at the Johnson Space Center in Houston. “I don’t know when the first one was, but the station will have been in orbit for 10 years [come] November.” “If there is any good news at all, it’s that the malware was designed to steal usernames and passwords from computer game players, not something that orbiting astronauts are likely to be spending a lot of time doing,” said Graham Cluley, a senior technology consultant with Sophos PLC, in a post to that company’s blog today. “After all, with a view like that, who needs to play the likes of World of Warcraft?” Related content news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO CSO and CISO C-Suite news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities opinion Cybersecurity professional job-satisfaction realities for National Cybersecurity Awareness Month Half of all cybersecurity pros are considering a job change, and 30% might leave the profession entirely. CISOs and other C-level execs should reflect on this for National Cybersecurity Awareness Month. By Jon Oltsik Oct 03, 2023 4 mins CSO and CISO Careers feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe