The Journal of Space Commerce

The Journal of Space Commerce

Supply Chain

What Viasat Taught the Pentagon

...and What Commercial Space Has Yet to Learn

Mike Turner's avatar
Mike Turner
Apr 29, 2026
∙ Paid

What This Means

The Viasat KA-SAT cyberattack on February 24, 2022, was not a one-time anomaly — it is the defining case study in how commercial satellite ground infrastructure becomes a national security liability. At the 41st Space Symposium, United States Space Command (USSPACECOM) commander Gen. Stephen Whiting described cyber defense as the “soft underbelly” of the U.S. space enterprise — a characterization attributed to his remarks at the Symposium and reported in the 41st Space Symposium comprehensive report; a formal transcript has been requested from USSPACECOM Public Affairs. For commercial satellite operators and their supply chains, the message was not rhetorical: the United States Space Force’s (USSF) Commercial Space Strategy now requires commercial providers to meet National Security Agency (NSA), National Institute of Standards and Technology (NIST), and Defense Information Systems Agency (DISA) standards to be considered for government integration. Cyber posture is no longer a compliance checkbox — it is a contract eligibility filter.

Somewhere in the ground segment of a commercial satellite operator, there is a modem management platform that last received a security patch fourteen months ago. The operator knows about it. Their cybersecurity vendor knows about it. Their insurance underwriter has a note about it somewhere in a risk model.

What is new — and what the 41st Space Symposium made unmistakably clear — is that the U.S. government knows about it too, and is now deciding which commercial operators are trustworthy enough to be woven into national security space architecture.

That is not a future concern. It is the operational context for 2026. USSPACECOM’s self-declared “Year of Integration” is the year the government moves from identifying commercial capabilities to operationalizing them. The entry fee, as Gen. Whiting made explicit in Colorado Springs, includes a cybersecurity posture that meets the Pentagon’s standards — not eventually, but before the next contract cycle. Commercial operators who have treated cybersecurity as an information technology cost center are about to discover it is a business development prerequisite.

The Signal: February 24, 2022, and Why It Still Matters in 2026

At approximately 3:02 a.m. Coordinated Universal Time (UTC) on February 24, 2022 — the same hour Russian forces crossed into Ukraine — a wave of focused, malicious traffic began disabling modems on Viasat’s KA-SAT satellite network. Within hours, tens of thousands of broadband customers across Ukraine and Europe lost service. Ukrainian military communications were disrupted. Wind turbine operators across Germany and Central Europe lost remote monitoring access to roughly 5,800 turbines.

Researchers at SentinelLabs identified the attack vector as “AcidRain,” a purpose-built wiper malware designed to remotely erase vulnerable modems and routers, and attributed it to the ground segment rather than the satellite itself. Viasat’s own incident report independently confirmed that attackers gained access to the satellite management network through a misconfigured virtual private network (VPN) appliance and deployed a destructive payload across the service footprint. It is important to note that while Viasat confirmed the VPN attack vector and the mechanism of modem erasure, Viasat disputed elements of SentinelLabs’ supply-chain framing — these represent two separate confirmations from two separate investigative tracks, and should be read as complementary rather than mutually validating.

Four years later, Gen. Whiting referenced the Viasat attack at the 41st Space Symposium not as cautionary history but as a live operational lesson. USSPACECOM keeps returning to this attack because the structural vulnerabilities it exposed have not been uniformly addressed across the commercial satellite sector.

The Supply Chain Map: Where the Exposure Lives

The Viasat attack is instructive precisely because it targeted a layer most commercial operators treat as secondary: ground segment management infrastructure. Understanding why requires mapping how the commercial satellite supply chain is actually structured.

A commercial satellite operator’s supply chain has at minimum three distinct technical layers, each carrying its own cyber exposure profile. The space segment — the satellite itself — is expensive, visible, and relatively well-hardened. The link segment — the radio frequency (RF) communications path — is regulated and monitored. The ground segment — network operations centers, modem management platforms, gateway infrastructure, and customer-premise equipment — is where cost pressure, vendor fragmentation, and legacy systems concentrate.

The ground segment is also where, as the Viasat attack demonstrated, a state-level adversary can achieve strategic effect without ever touching the satellite. The AcidRain malware required no space-domain expertise. It required access to a misconfigured VPN.

The USSF’s April 2024 Commercial Space Strategy is explicit about this layered exposure, stating that “cybersecurity is a foundational requirement for any commercial provider to be considered for USSF integration” and that providers will be evaluated against NSA, NIST, and DISA standards “across all segments — ground, link, and space.” That three-segment framing matters: the government is not satisfied by satellite hardening alone. Ground infrastructure is in scope.

For operators with fragmented vendor stacks — common among small and mid-tier commercial satellite service providers who assembled ground systems from multiple contractors across multiple years — the compliance challenge is not a single audit. It is a supply chain-level exercise in mapping every point of access, every legacy integration, and every third-party dependency. Note: specific sub-tier vendor cybersecurity posture claims beyond what the USSF Commercial Space Strategy explicitly covers are inferred from program structure and have not been independently verified through primary sources; all such characterizations should be read as structural inference, not confirmed operator-level assessment.

That exercise has not been uniformly conducted. The Apollo Insight wargame, run by USSPACECOM in March 2026 under the direction of Cmdr. Heather Thomas, USSPACECOM’s Commercial Integration Branch Chief, gathered senior leaders from more than 60 commercial companies to simulate a nuclear anti-satellite weapon deployment in orbit and map which commercial technologies could contribute to a response. The exercise surfaced not only technical gaps but decision-making latency issues in government-commercial coordination — and the cyber layer was identified as a concentrated point of vulnerability in any integrated response architecture. These details are reported from the 41st Space Symposium comprehensive report; independent USSPACECOM press release confirmation of specific wargame findings was not available as of publication.

A second tabletop exercise, “Campaigning with Commercial Partners,” is scheduled for June 24, 2026, at The Aerospace Corporation in Colorado Springs, Colorado. Operators and prime contractors who participate will be shaping the government’s expectations for what a cybersecurity-ready commercial partner looks like — before those expectations are codified into contract requirements.

"The next sections map exactly where the cyber exposure lives in commercial satellite supply chains, how the USSF compliance framework creates a contract eligibility filter, and what the June 24 decision window means for operators, investors, and vendors. Subscribers get full access — including role-specific decision questions and a five-point action checklist."

User's avatar

Continue reading this post for free, courtesy of Mike Turner.

Or purchase a paid subscription.
© 2026 Ex Terra Media, LLC · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture