{"id":21027,"date":"2023-05-04T03:17:26","date_gmt":"2023-05-04T07:17:26","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/mandalorian-season-3-cybersecurity\/21027\/"},"modified":"2023-05-04T13:24:28","modified_gmt":"2023-05-04T09:24:28","slug":"mandalorian-season-3-cybersecurity","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/mandalorian-season-3-cybersecurity\/21027\/","title":{"rendered":"Cybersecurity in season 3 of The Mandalorian"},"content":{"rendered":"<p>Season 3 of The Mandalorian TV series gave us a look at the state of information security in the Star Wars universe nine years after the Battle of Yavin. And the more I watch this show, the more I get the impression that all the infosec problems of the galaxy far, far away have two roots\u00a0\u2014 negligence and droids. Before you continue reading, please be warned that there may be spoilers in the text.<\/p>\n<p>The whole situation with droids in the Star Wars universe brings forth a certain\u2026 ethical-moral issue. The thing is, they\u2019re sentient (they think, feel. and have emotions), while at the same time they\u2019re owned by someone (or some<em>thing<\/em>). And even the \u201cgood\u201d characters don\u2019t regard this as much of a problem. Meanwhile, droids can have motives of their own, which don\u2019t necessarily coincide with the whims and wishes of their owners.<\/p>\n<p>Of the new things we learned from this season of The Mandalorian, we now know how droids get their software updates. It turns out, they visit bars to get updated\u2026 through booze! (I guess that makes a good excuse when asked \u201cwhy are you drunk again?\u201d: \u201cJust updating, darling!\u201d) The bars serve the drink Nepenthe, which is a lubricant for protection against mechanical wear-and-tear mixed with subparticles delivering programming updates and new commands from the mainframe. Truth be told, this doesn\u2019t seem very safe: droids operate in almost every corner of the galaxy, while it\u2019s the first time ever we see a bar for them. Still, at least now we know they can get any updates at all!<\/p>\n<h2>Assassin droid IG-11<\/h2>\n<p>Toward the end of Season 1, the rehabilitated assassin droid IG-11\u00a0\u2014 while surrounded by the Imperials\u00a0\u2014 declared that, according to his manufacturer\u2019s protocols, he should never be captured by the enemy, and so activated self-destruction. In theory, this is a good idea: it was designed not only to protect the information in the droid\u2019s memory, but also to prevent turning the droid against the original owner.<\/p>\n<p>However, there\u2019s one problem: poor implementation of this self-destruct mechanism. In the third season, the lead character decides to reactivate his fallen comrade-in-arms. And it comes to light that this is quite doable! Moreover, even though the machine has lost plenty of its marbles, some scraps of information are still there\u00a0\u2014 for example, it can still quote subparagraph 16 of the Bondsman Guild protocol. This vividly demonstrates how the self-destruct mechanism is not to be trusted with emergency data destruction: it\u2019s not so reliable.<\/p>\n<h2>Astromech droid R5-D4<\/h2>\n<p>R5-D4 is a distinguished droid. He\u2019s one of the first defective droids we see in the Star Wars universe ever. R5 is there from the very first (fourth) episode of Star Wars, when he was passed over for purchase by Luke Skywalker from Jawas due to a motivator malfunction. In the third season of The Mandalorian, the droid is foisted upon the series\u2019 namesake as a co-pilot and to explore the planet of Mandalore \u2014 mostly destroyed by war. However, it turns out that R5 doesn\u2019t show a great deal of respect for ownership rights, and stays true to his former masters\u00a0\u2014 ex-rebels, now New Republic pilots.<\/p>\n<p>We never find out whether this is due to astromech\u2019s default functionality or a repercussion of software modification carried out by the rebels, but R5-D4 is able to access information networks and gain control of Imperial security systems. But that\u2019s not what should concern: after all he does this in his owner\u2019s interests. What\u2019s more troubling is that one fine day he leaks the Mandalorians\u2019 <a href=\"https:\/\/starwars.fandom.com\/wiki\/Covert\" target=\"_blank\" rel=\"nofollow noopener\">covert<\/a> coordinates to his former war buddy. Furthermore, when Captain Teva decides to seek out the Mandalorians\u2019 hiding place, he hardly goes and talks to all the droids he knows. Which means R5 keeps reporting his whereabouts to his Rebel friends and spies on his owners.<\/p>\n<h2>Reprogrammed droids from Plazir-15<\/h2>\n<p>The planet Plazir-15 is a world where people don\u2019t work\u00a0\u2014 all their labor-consuming jobs are done by reprogrammed Imperial and separatist droids. Let\u2019s leave aside the question of why other worlds don\u2019t live the same way, while the New Republic persists in scrapping Imperial equipment. Most of the time repurposed droids are grateful for a second chance, because otherwise they\u2019d be disassembled. And yet the planet constantly faces droid-related incidents\u00a0\u2014 from minor sabotage to direct assaults on humans.<\/p>\n<p>The lead character undertakes an incident-response-team role to investigate the recent series of incidents, and discovers that the droids\u2019 software has been tampered with. And the tampering was accomplished by poisoning the above-mentioned update delivery mechanism: in one of the batches of Nepenthe, subparticles were replaced with nano-droids that reprogram the drinkers to force them to inflict harm upon humans and their property. Yet another reason to doubt the reliability of this firmware update mechanism.<\/p>\n<p>However, it\u2019s not at all difficult to find the culprit. Commissioner Helgait, head of security in charge of the local SOC, is also a hacktivist. But this (so-called) colleague of ours went and left a financial trail by ordering nano-droids from the local information-security office under his own name (despite being <em>head<\/em> of <em>security<\/em>!). As least he was smart enough to create a mechanism to roll reprogrammed battle droids back to a separatist firmware version; only problem \u2014 he failed to actually use the mechanism for lack of time.<\/p>\n<h2>Cybersecurity status of the main factions<\/h2>\n<p>All in all, there\u2019s one word to describe the developments in the information security policies of both the New Republic and the Imperial remnants, and the word is <em>degradation<\/em>.<\/p>\n<h3>New Republic<\/h3>\n<p>The New Republic is actively trying to integrate former Imperial servants into society. No doubt, it was a commendable initiative. However, it\u2019s not the most prudent decision of all to give folks who\u2019d fought on the enemy side less than a year ago access to any secret information. But this bothers no one: Moff Gideon\u2019s (bad guy) former communications officer (bad guy) can be seen walking up and down the office of Colonel Tuttle (good guy) \u2014 in charge of distributing military aid to the Republican worlds. Meanwhile a former Imperial scientist is taking stock of discarded Imperial assets.<\/p>\n<p>The situation is bad from any angle:<\/p>\n<ul>\n<li>There\u2019s an Imperial probe droid hovering in the middle of the Coruscant (the Republic\u2019s capital), which maintains direct interplanetary video communication between the Imperials and their spies.<\/li>\n<li>Within the limits of the city (yeah, the whole planet is actually within the limits of the city, but still) there sits, quite unguarded, an Imperial capital ship\u00a0\u2014 anyone can walk right in and borrow some tools that aren\u2019t quite legal.<\/li>\n<li>The \u201cmental rehabilitation\u201d procedure for victims of Imperial propaganda isn\u2019t secured at all: Republic officers leave a perfect stranger at the Six-O-Two Mitigator\u2019s control panel, even though manipulations with it can harm the patient or compromise the procedure.<\/li>\n<\/ul>\n<h3>Imperial remnants<\/h3>\n<p>The last two episodes present us with an opportunity to look at an Imperial base in the ruins of Mandalore. And it looks like the base was designed by someone with a very strange outlook on security. The base has a full-fledged information security and communications center, from which local specialists can track the movements of outsiders on the base map and connect to Imperial commanders stationed on other bases. As you would expect, the important information systems have strong physical security measures: to reach the center one has to pass a corridor with multiple force fields with Imperial stormtroopers posted in-between. But, believe it or not, the center has another door, which leads to a hangar with access to the surface of the planet! And that door isn\u2019t guarded at all! Which kind of casts doubts as to the reliability of the overall access security system.<\/p>\n<p>Other than that, there are the standard Imperial key system security screw-ups:<\/p>\n<ul>\n<li>The control panel that controls cloning facility can be accessed without any authentication whatsoever\u00a0\u2014 sabotage it all you can.<\/li>\n<li>Scattered all over the base are ports for external droid interfaces, through which a totally unauthenticated droid can not only deactivate the force fields blocking the corridor, but also put out of action the fields\u2019 regular controls. Come on, Imperials, didn\u2019t you have the <a href=\"https:\/\/www.kaspersky.com\/blog\/star-wars-cybersecurity-problems\/6392\/\" target=\"_blank\" rel=\"noopener nofollow\">Death Star hacked<\/a> the same way less than 10 years ago? Wasn\u2019t there enough time to devise some countermeasures and add some security updates?<\/li>\n<\/ul>\n<h2>Ship control interception mechanism<\/h2>\n<p>There was one more incident on Plazir-15\u00a0\u2014 not very prominent but quite an alarming one. The local traffic control center somehow managed to take control over a Mandalorian spaceship during its landing approach. A rational arrangement in theory: it\u2019s better to have the landing controlled by someone with local landscape knowledge. But on a practical level, the very existence of such a technology on a combat ship is a threat. One day it\u2019s going to be exploited in a combat situation to crash the starfighter on the surface of the planet or into another spaceship.<\/p>\n<h2>How to avoid a fair share of these problems<\/h2>\n<p>The trouble with droids and spaceships could have been avoided if their information systems were based on a <a href=\"https:\/\/os.kaspersky.com\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=ae_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=ae_kdaily_organic_svfgv92uamkzgs1\" target=\"_blank\" rel=\"noopener nofollow\">cyber-immune operating system<\/a>. That would make droids, despite their wishes to the contrary or external commands, unable to perform any actions unless specifically sanctioned by the owner\u2019s programming. Other than that, officers of the Empire and the Republic alike would be far better off with regular <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">modern cybersecurity awareness<\/a> training.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.<\/p>\n","protected":false},"author":700,"featured_media":21028,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[1765,1767,2047],"class_list":{"0":"post-21027","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-mtfbwy","10":"tag-star-wars","11":"tag-truth"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mandalorian-season-3-cybersecurity\/21027\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mandalorian-season-3-cybersecurity\/25608\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mandalorian-season-3-cybersecurity\/28239\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mandalorian-season-3-cybersecurity\/25907\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mandalorian-season-3-cybersecurity\/26264\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mandalorian-season-3-cybersecurity\/28742\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mandalorian-season-3-cybersecurity\/35259\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mandalorian-season-3-cybersecurity\/48070\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mandalorian-season-3-cybersecurity\/20499\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mandalorian-season-3-cybersecurity\/30068\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mandalorian-season-3-cybersecurity\/26246\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mandalorian-season-3-cybersecurity\/31915\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mandalorian-season-3-cybersecurity\/31598\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/mtfbwy\/","name":"MTFBWY"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21027"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21027\/revisions"}],"predecessor-version":[{"id":21029,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21027\/revisions\/21029"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21028"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}