The Gold Coast Bulletin

SpaceX troll must be off their rocket

- SUZANNE SIMONOT suzanne.simonot@news.com.au

FORMER lovebirds Elon Musk and Amber Heard have reunited on the Gold Coast but it seems someone at the billionair­e’s rocket company SpaceX is unhappy at the prospect of any reconcilia­tion.

The Bulletin received a message on August 4 – the day before news of the couple’s split broke – claiming Aquaman star Heard, 31, had been seeing a local sportsman.

The message included the Gold Coast address where Heard is staying – previously a closely guarded secret.

The Bulletin has witheld the sportsman’s name and Heard’s address.

“(Redacted) is spending many nights week at Amber Heard’s house on (redacted) on the (redacted) and leaving early in the morning looking like the cat that swallowed the canary,” the message said.

The sportsman denied the allegation, saying: “Who told you this?”

According to the message’s metadata, the informatio­n was sent from California on August 4 from an iPhone using the IP address belonging to Space Exploratio­n Technologi­es Corp – better known as SpaceX.

The privately held US aerospace company was founded by billionair­e businessma­n Musk.

Numerous informatio­n technology experts have told The Bulletin it was highly unlikely – but not impossible – the Space X IPv4 address, owned by US internet service provider Cogent Communicat­ions, had been hijacked, meaning it likely came from within the organisati­on.

They said alarm bells would sound at SpaceX if its IP address had been compromise­d and someone outside the company had sent the message.

Security operations team leader Phil Cole from AusCERT, a leading Cyber Emergency Response Team that protects organisati­ons in Australia and the Asia/Pacific including The University of Queensland, said it was possible but unlikely the Space X IP address had been ‘spoofed’.

‘Spoofing’ occurs when an email message is created with a misleading sender address.

“The originatin­g IP for the tip does appear to be associated with SpaceX (Space Exploratio­n Technologi­es Corp) based on ‘whois’ records for this IP, however this does not guarantee that it is definitely a SpaceX employee,” he said.

“It isn’t really possible to spoof the network traffic to make it appear to have come from this address.

“While it could be possible that there is a compromise­d host within SpaceX that was used to proxy traffic through, it is highly unlikely that someone would go to the effort to do this.

“I don’t see anything that would indicate that a host inside SpaceX has been compromise­d.”

Queensland University of Technology (QUT) Head of Software Engineerin­g & Data Communicat­ions, Emeritus Professor Bill Caelli, said a person would require a very sophistica­ted level of knowledge and expertise “well beyond the average home user” to fake the IP address.

An expert in public policy and security/cryptograp­hy, informatio­n technology developmen­t and computer security, informatio­n technology and network security, Professor Caelli received The Colloquium for Informatio­n Systems Security Education Founders Medal in June for exceptiona­l service to cybersecur­ity education.

He said two things would have to happen for the SpaceX address to be compromise­d to message The Bulletin.

“The ‘baddie’ (the person hijacking the IP address) has to have the technical ability and the ‘goodie’ (the user being hijacked) has to have holes and gaps in their addresses,” he said.

The Bulletin contacted SpaceX for comment but did not receive a response by deadline.

IT ISN’T REALLY POSSIBLE TO SPOOF THE NETWORK TRAFFIC TO MAKE (THE MESSAGE) APPEAR TO HAVE COME FROM THIS ADDRESS. — PHIL COLE, AUSCERT

Newspapers in English

Newspapers from Australia